Описание
In Ashlar-Vellum Cobalt, Xenon, Argon, Lithium, and Cobalt Share versions prior to 12.6.1204.204, the affected applications lack proper validation of user-supplied data when parsing VC6 files. This could lead to a heap-based buffer overflow. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process.
Ссылки
- Third Party AdvisoryUS Government Resource
Уязвимые конфигурации
Конфигурация 1Версия до 12.2.1204.204 (исключая)Версия до 12.2.1204.204 (исключая)Версия до 12.2.1204.204 (исключая)Версия до 12.2.1204.204 (исключая)Версия до 12.2.1204.204 (исключая)
Одно из
cpe:2.3:a:ashlar:argon:*:*:*:*:*:*:*:*
cpe:2.3:a:ashlar:cobalt:*:*:*:*:*:*:*:*
cpe:2.3:a:ashlar:cobalt_share:*:*:*:*:*:*:*:*
cpe:2.3:a:ashlar:lithium:*:*:*:*:*:*:*:*
cpe:2.3:a:ashlar:xenon:*:*:*:*:*:*:*:*
EPSS
Процентиль: 7%
0.00028
Низкий
7.8 High
CVSS3
Дефекты
CWE-122
Связанные уязвимости
CVSS3: 7.8
github
6 месяцев назад
In Ashlar-Vellum Cobalt, Xenon, Argon, Lithium, and Cobalt Share versions prior to 12.6.1204.204, the affected applications lack proper validation of user-supplied data when parsing VC6 files. This could lead to a heap-based buffer overflow. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process.
EPSS
Процентиль: 7%
0.00028
Низкий
7.8 High
CVSS3
Дефекты
CWE-122