First published: Tue Feb 04 2025(Updated: )
In Ashlar-Vellum Cobalt versions prior to v12 SP2 Build (1204.200), the affected application lacks proper validation of user-supplied data when parsing CO files. This could lead to a heap-based buffer overflow. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Ashlar-Vellum Cobalt | <12 SP2 Build (1204.200) | |
Ashlar-Vellum Xenon | <12 SP2 Build (1204.200) | |
Ashlar-Vellum Argon | <12 SP2 Build (1204.200) | |
Ashlar-Vellum Lithium | <12 SP2 Build (1204.200) | |
Ashlar-Vellum recommends users apply the following mitigations to help reduce risk: * Install the latest version of Graphite https://download.ashlar.com/v13/gr.html . * Update to the latest version for Cobalt, Xenon, Lithium, and Argon by installing v12 SP12 Alpha https://download.ashlar.com/v12/mod-history.html Build (1204.200) (Jan 22, 2025). * Only open files from trusted sources.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-40222 is classified as a critical vulnerability due to its potential to allow arbitrary code execution.
To fix CVE-2023-40222, users should upgrade Ashlar-Vellum Cobalt, Xenon, Argon, and Lithium to version 12 SP2 Build (1204.200) or later.
CVE-2023-40222 is caused by a lack of proper validation of user-supplied data when parsing CO files, leading to a heap-based buffer overflow.
CVE-2023-40222 affects Ashlar-Vellum Cobalt, Xenon, Argon, and Lithium versions prior to 12 SP2 Build (1204.200).
Yes, CVE-2023-40222 can be exploited remotely by an attacker crafting malicious CO files.