In Ashlar-Vellum Graphite v13.0.48, the affected application lacks proper validation of user-supplied data when parsing VC6 files. This could lead to an out-of-bounds read. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process.



Project Subscriptions

Vendors Products
Graphite Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2023-43634 In Ashlar-Vellum Graphite v13.0.48, the affected application lacks proper validation of user-supplied data when parsing VC6 files. This could lead to an out-of-bounds read. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process.
Fixes

Solution

Ashlar-Vellum recommends users apply the following mitigations to help reduce risk: * Install the latest version of Graphite https://download.ashlar.com/v13/gr.html * Only open files from trusted sources.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2024-09-09T16:11:53.686Z

Reserved: 2023-08-10T19:30:27.401Z

Link: CVE-2023-39936

cve-icon Vulnrichment

Updated: 2024-08-02T18:18:10.188Z

cve-icon NVD

Status : Modified

Published: 2023-10-26T20:15:08.573

Modified: 2024-11-21T08:16:04.440

Link: CVE-2023-39936

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses