First published: Tue Feb 04 2025(Updated: )
In Ashlar-Vellum Cobalt versions prior to v12 SP2 Build (1204.200), the affected application lacks proper validation of user-supplied data when parsing XE files. This could lead to an out-of-bounds write. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Ashlar-Vellum Cobalt | ||
Ashlar-Vellum Cobalt | ||
Ashlar-Vellum Graphite | ||
Ashlar-Vellum Xenon | ||
Ashlar-Vellum Argon | ||
Ashlar-Vellum Lithium |
Ashlar-Vellum recommends users apply the following mitigations to help reduce risk: * Install the latest version of Graphite https://download.ashlar.com/v13/gr.html . * Update to the latest version for Cobalt, Xenon, Lithium, and Argon by installing v12 SP12 Alpha https://download.ashlar.com/v12/mod-history.html Build (1204.200) (Jan 22, 2025). * Only open files from trusted sources.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-39943 is considered to have a high severity due to the potential for arbitrary code execution.
To fix CVE-2023-39943, update Ashlar-Vellum Cobalt, Graphite, Xenon, Argon, or Lithium to version 12 SP2 Build (1204.200) or later.
The affected products for CVE-2023-39943 include Ashlar-Vellum Cobalt, Cobalt Share, Graphite, Xenon, Argon, and Lithium versions prior to v12 SP2 Build (1204.200).
CVE-2023-39943 can be exploited by an attacker leveraging the vulnerability to perform an out-of-bounds write, potentially leading to arbitrary code execution.
CVE-2023-39943 was published on an unspecified date in 2023, with details focusing on vulnerabilities in the Ashlar-Vellum software.