Metrics
Affected Vendors & Products
Solution
Ashlar-Vellum recommends users apply the following mitigations to help reduce risk: * Install the latest version of Graphite https://download.ashlar.com/v13/gr.html . * Update to the latest version for Cobalt, Xenon, Lithium, and Argon by installing v12 SP12 Alpha https://download.ashlar.com/v12/mod-history.html Build (1204.200) (Jan 22, 2025). * Only open files from trusted sources.
Workaround
No workaround given by the vendor.
Tue, 15 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Thu, 06 Feb 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 04 Feb 2025 22:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In Ashlar-Vellum Cobalt versions prior to v12 SP2 Build (1204.200), the affected application lacks proper validation of user-supplied data when parsing CO files. This could lead to a heap-based buffer overflow. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process. | |
Title | Ashlar-Vellum Cobalt, Xenon, Argon, Lithium Heap-based Buffer Overflow | |
Weaknesses | CWE-122 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-02-05T19:44:07.344Z
Reserved: 2023-08-10T19:30:27.396Z
Link: CVE-2023-40222

Updated: 2025-02-05T19:43:49.641Z

Status : Received
Published: 2025-02-04T23:15:08.413
Modified: 2025-02-04T23:15:08.413
Link: CVE-2023-40222

No data.

No data.