1. EXECUTIVE SUMMARY
- CVSS v4 8.4
- ATTENTION: Low attack complexity
- Vendor: Ashlar-Vellum
- Equipment: Cobalt, Xenon, Argon, Lithium, Cobalt Share
- Vulnerabilities: Out-of-bounds Write, Out-of-bounds Read, Heap-based Buffer Overflow
2. RISK EVALUATION
Successful exploitation of these vulnerabilities could allow an attacker to disclose information and execute arbitrary code.
3. TECHNICAL DETAILS
3.1 AFFECTED PRODUCTS
The following Ashlar-Vellum products are affected:
- Cobalt: All versions prior to 12.6.1204.204
- Xenon: All versions prior to 12.6.1204.204
- Argon: All versions prior to 12.6.1204.204
- Lithium: All versions prior to 12.6.1204.204
- Cobalt Share: All versions prior to 12.6.1204.204
3.2 VULNERABILITY OVERVIEW
3.2.1 OUT-OF-BOUNDS WRITE CWE-787
In Ashlar-Vellum Cobalt, Xenon, Argon, Lithium, and Cobalt Share versions prior to 12.6.1204.204, the affected applications lack proper validation of user-supplied data when parsing CO files. This could lead to an out-of-bounds write. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process.
CVE-2025-53705 has been assigned to this vulnerability. A CVSS v3.1 base score of 7.8 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).
A CVSS v4 score has also been calculated for CVE-2025-53705. A base score of 8.4 has been calculated; the CVSS vector string is (AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/V
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
Read the original article: