First published: Wed Apr 12 2023(Updated: )
Adobe Substance 3D Stager version 2.0.1 (and earlier) is affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe Substance 3D Stager | <=2.0.1 | |
macOS | ||
Microsoft Windows Operating System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-26391 has been classified with a medium severity rating due to its potential for code execution through an out-of-bounds read.
To remediate CVE-2023-26391, update Adobe Substance 3D Stager to version 2.0.2 or later, which addresses the vulnerability.
Adobe Substance 3D Stager versions 2.0.1 and earlier are affected by CVE-2023-26391.
CVE-2023-26391 can be exploited by attackers to execute arbitrary code by using specially crafted files.
Currently, there are no known workarounds for CVE-2023-26391; the recommended solution is to update the software.