Lucene search

K
cvelistIcscertCVELIST:CVE-2023-39427
HistoryOct 26, 2023 - 7:29 p.m.

CVE-2023-39427 Ashlar-Vellum Cobalt, Xenon, Argon, Lithium Out-of-bounds Write

2023-10-2619:29:07
CWE-787
icscert
www.cve.org
cve-2023-39427
ashlar-vellum
out-of-bounds write
arbitrary code
xe files
validation

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

32.3%

In Ashlar-Vellum Cobalt, Xenon, Argon, Lithium, and Cobalt Share v12 SP0 Build (1204.77), the affected applications lack proper validation of user-supplied data when parsing XE files. This could lead to an out-of-bounds write. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process.

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "Cobalt",
    "vendor": "Ashlar-Vellum",
    "versions": [
      {
        "status": "affected",
        "version": "v12 SP0 Build (1204.77)"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "Xenon",
    "vendor": "Ashlar-Vellum",
    "versions": [
      {
        "status": "affected",
        "version": "v12 SP0 Build (1204.77)"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "Argon",
    "vendor": "Ashlar-Vellum",
    "versions": [
      {
        "status": "affected",
        "version": "v12 SP0 Build (1204.77)"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "Lithium",
    "vendor": "Ashlar-Vellum",
    "versions": [
      {
        "status": "affected",
        "version": "v12 SP0 Build (1204.77)"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "Cobalt Share",
    "vendor": "Ashlar-Vellum",
    "versions": [
      {
        "status": "affected",
        "version": "v12 SP0 Build (1204.77)"
      }
    ]
  }
]

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

32.3%

Related for CVELIST:CVE-2023-39427