In Ashlar-Vellum Cobalt versions prior to v12 SP2 Build (1204.200), the affected application lacks proper validation of user-supplied data when parsing CO files. This could lead to a heap-based buffer overflow. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process.
Metrics
Affected Vendors & Products
References
History
Tue, 15 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Thu, 06 Feb 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 04 Feb 2025 22:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In Ashlar-Vellum Cobalt versions prior to v12 SP2 Build (1204.200), the affected application lacks proper validation of user-supplied data when parsing CO files. This could lead to a heap-based buffer overflow. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process. | |
Title | Ashlar-Vellum Cobalt, Xenon, Argon, Lithium Heap-based Buffer Overflow | |
Weaknesses | CWE-122 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: icscert
Published: 2025-02-04T22:13:12.592Z
Updated: 2025-02-05T19:44:07.344Z
Reserved: 2023-08-10T19:30:27.396Z
Link: CVE-2023-40222

Updated: 2025-02-05T19:43:49.641Z

Status : Received
Published: 2025-02-04T23:15:08.413
Modified: 2025-02-04T23:15:08.413
Link: CVE-2023-40222

No data.