漏洞标题
Ashlar-Vellum Cobalt CO文件解析栈基缓冲区溢出远程代码执行漏洞
漏洞描述信息
Ashlar-Vellum Cobalt CO文件解析栈基缓冲区溢出远程代码执行漏洞。此漏洞允许远程攻击者在受影响的Ashlar-Vellum Cobalt安装上执行任意代码。利用此漏洞需要用户交互,目标必须访问恶意页面或打开恶意文件。
具体漏洞存在于CO文件的解析中。问题在于在将用户提供的数据复制到栈基缓冲区之前,缺乏对数据长度的有效验证。攻击者可以利用此漏洞在当前进程的上下文中执行代码。这是一个被标识为ZDI-CAN-17865的漏洞。
CVSS信息
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
漏洞类别
栈缓冲区溢出
漏洞标题
Ashlar-Vellum Cobalt CO File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability
漏洞描述信息
Ashlar-Vellum Cobalt CO File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of CO files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.
. Was ZDI-CAN-17865.
CVSS信息
N/A
漏洞类别
栈缓冲区溢出
漏洞标题
Ashlar Incorporated Ashlar-Vellum 安全漏洞
漏洞描述信息
Ashlar Incorporated Ashlar-Vellum是Ashlar Incorporated公司的计算机辅助设计 (CAD) 和 3D 建模软件的开发平台。 Ashlar Incorporated Ashlar-Vellum Cobalt存在安全漏洞,该漏洞源于存在基于堆栈的缓冲区溢出远程代码执行漏洞,允许远程攻击者在受影响的安装上执行任意代码。
CVSS信息
N/A
漏洞类别
其他