First published: Mon Mar 10 2025(Updated: )
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of VS files. The issue results from the lack of proper initialization of memory prior to accessing it. An attacker can leverage this vulnerability to execute code in the context of the current process.
Affected Software | Affected Version | How to fix |
---|---|---|
Ashlar-Vellum Cobalt | ||
Ashlar-Vellum Cobalt |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
ZDI-CAN-25235 has a high severity rating due to the potential for remote code execution.
To mitigate ZDI-CAN-25235, users should update Ashlar-Vellum Cobalt to the latest version that addresses this vulnerability.
ZDI-CAN-25235 can allow attackers to execute arbitrary code by enticing users to visit a malicious page or open a harmful file.
Yes, user interaction is necessary as the target must either visit a malicious webpage or open a compromised file.
ZDI-CAN-25235 specifically affects Ashlar-Vellum Cobalt installations.