First published: Thu Oct 26 2023(Updated: )
In Ashlar-Vellum Cobalt, Xenon, Argon, Lithium, and Cobalt Share v12 SP0 Build (1204.77), the affected applications lack proper validation of user-supplied data when parsing XE files. This could lead to an out-of-bounds write. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Ashlar Cobalt | <=12 | |
Ashlar Graphite | <=13.0.48 | |
Ashlar Xenon | <=12 | |
Ashlar Argon | <=12 | |
Ashlar Lithium | <=12 |
Ashlar-Vellum recommends users apply the following mitigations to help reduce risk: * Cobalt, Xenon, Lithium, and Argon share update v12 https://download.ashlar.com/v12/ Build (1204.78). * Only open files from trusted sources.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this security issue is CVE-2023-39427.
The severity of CVE-2023-39427 is high.
Ashlar Cobalt, Ashlar Graphite, Ashlar Xenon, Ashlar Argon, and Ashlar Lithium are affected by CVE-2023-39427.
CVE-2023-39427 is an out-of-bounds write vulnerability in Ashlar-Vellum Cobalt, Xenon, Argon, Lithium, and Cobalt Share v12 SP0 Build (1204.77) that occurs due to lack of proper validation of user-supplied data when parsing XE files.
An attacker can exploit CVE-2023-39427 to execute arbitrary code on a vulnerable system.