漏洞标题
Ashlar-Vellum Cobalt AR 文件解析类型混淆远程代码执行漏洞
漏洞描述信息
阿什拉-维拉明科博尔特AR文件解析类型混淆远程代码执行漏洞。此漏洞允许远程攻击者在受影响的阿什拉-维拉明科博尔特安装上执行任意代码。利用此漏洞需要用户交互,目标必须访问恶意页面或打开恶意文件。
具体漏洞存在于AR文件的解析中。问题源于对用户提供的数据缺乏适当的验证,可能导致类型混淆条件。攻击者可以利用此漏洞在当前进程的上下文中执行代码。这是ZDI-CAN-20409。
CVSS信息
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
漏洞类别
不正确的类型转换
漏洞标题
Ashlar-Vellum Cobalt AR File Parsing Type Confusion Remote Code Execution Vulnerability
漏洞描述信息
Ashlar-Vellum Cobalt AR File Parsing Type Confusion Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of AR files. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code in the context of the current process.
. Was ZDI-CAN-20409.
CVSS信息
N/A
漏洞类别
使用不兼容类型访问资源(类型混淆)
漏洞标题
Ashlar Incorporated Ashlar-Vellum Cobalt 安全漏洞
漏洞描述信息
Ashlar Incorporated Ashlar-Vellum是Ashlar Incorporated公司的计算机辅助设计 (CAD) 和 3D 建模软件的开发平台。 Ashlar Incorporated Ashlar-Vellum Cobalt存在安全漏洞,该漏洞源于存在文件解析类型混淆远程代码执行漏洞,允许远程攻击者在受影响的安装上执行任意代码。
CVSS信息
N/A
漏洞类别
其他