First published: Wed Apr 12 2023(Updated: )
Adobe Substance 3D Stager version 2.0.1 (and earlier) is affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe Substance 3D Stager | <=2.0.1 | |
Apple macOS | ||
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-26393 is rated as high with a CVSS score of 7.8.
CVE-2023-26393 affects Adobe Substance 3D Stager version 2.0.1 (and earlier) due to an out-of-bounds read vulnerability when parsing a crafted file, potentially leading to code execution.
Apple macOS and Microsoft Windows are not directly affected by CVE-2023-26393, as the vulnerability specifically targets Adobe Substance 3D Stager version 2.0.1 and earlier.
An attacker could exploit the out-of-bounds read vulnerability in Adobe Substance 3D Stager by parsing a specially crafted file, leading to a read past the end of an allocated memory structure and potential code execution.
For more information about CVE-2023-26393 and its impact on Adobe Substance 3D Stager, refer to the Adobe security advisory APSB23-26 available on Adobe's website.