First published: Mon Mar 27 2023(Updated: )
Adobe Substance 3D Stager versions 2.0.0 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe Substance 3D Stager | <=2.0.0 | |
macOS | ||
Microsoft Windows Operating System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-25869 is considered high due to the potential for code execution based on an out-of-bounds read.
To fix CVE-2023-25869, update Adobe Substance 3D Stager to the latest version above 2.0.0.
CVE-2023-25869 affects Adobe Substance 3D Stager versions 2.0.0 and earlier on compatible operating systems.
Yes, an attacker can exploit CVE-2023-25869 remotely by parsing a crafted file to trigger the vulnerability.
The impact of CVE-2023-25869 includes the risk of unauthorized code execution which can compromise system security.