First published: Mon Mar 10 2025(Updated: )
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of VS files. The issue results from the lack of proper initialization of memory prior to accessing it. An attacker can leverage this vulnerability to execute code in the context of the current process.
Affected Software | Affected Version | How to fix |
---|---|---|
Ashlar-Vellum Cobalt | ||
Ashlar-Vellum Cobalt |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-25-115 is significant as it allows remote code execution when a user interacts with malicious content.
To fix ZDI-25-115, update Ashlar-Vellum Cobalt to the latest version available from the vendor.
ZDI-25-115 exploits require user interaction, such as visiting a malicious webpage or opening a malicious file.
All users of Ashlar-Vellum Cobalt are at risk of ZDI-25-115 if they do not apply the necessary security updates.
Yes, user interaction is required to exploit ZDI-25-115, making it dependent on the target opening malicious content.