Ashlar-Vellum Cobalt VC6 File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of VC6 files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated data structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-25944.
The specific flaw exists within the parsing of VC6 files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated data structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-25944.
Metrics
Affected Vendors & Products
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
Link | Providers |
---|---|
https://www.zerodayinitiative.com/advisories/ZDI-25-638/ |
![]() ![]() |
History
Thu, 18 Sep 2025 12:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Ashlar
Ashlar cobalt |
|
Vendors & Products |
Ashlar Vellum
Ashlar Vellum cobalt |
Ashlar
Ashlar cobalt |
Thu, 18 Sep 2025 12:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Ashlar Vellum
Ashlar Vellum cobalt |
|
Vendors & Products |
Ashlar Vellum
Ashlar Vellum cobalt |
Wed, 17 Sep 2025 21:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Ashlar-Vellum Cobalt VC6 File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of VC6 files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated data structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-25944. | |
Title | Ashlar-Vellum Cobalt VC6 File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability | |
Weaknesses | CWE-787 | |
References |
| |
Metrics |
cvssV3_0
|

Status: PUBLISHED
Assigner: zdi
Published:
Updated: 2025-09-17T20:51:57.136Z
Reserved: 2025-07-21T19:49:59.408Z
Link: CVE-2025-7990

No data.

Status : Received
Published: 2025-09-17T21:15:40.580
Modified: 2025-09-17T21:15:40.580
Link: CVE-2025-7990

No data.

Updated: 2025-09-18T12:41:19Z