Ashlar-Vellum Graphite VC6 File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
CVE-2023-34308
8.8HIGH
What is CVE-2023-34308?
The vulnerability arises in Ashlar-Vellum Graphite due to inadequate validation when parsing VC6 files. This flaw allows remote attackers to execute arbitrary code on affected installations by compelling a user to visit a malicious webpage or open a compromised VC6 file. The vulnerability exploits the inadequacies of user-supplied data handling, resulting in a write past the end of an allocated buffer. By leveraging this issue, attackers can execute code within the context of the current process, posing a significant risk to the integrity and confidentiality of the system.
Affected Version(s)
Graphite Ashlar-Vellum Graphite v13 Special Edition. Build 13.0.46
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
CVSS V3.0
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
