Ashlar-Vellum Cobalt VC6 File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the parsing of VC6 files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated data structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-25944.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 18 Sep 2025 12:45:00 +0000

Type Values Removed Values Added
First Time appeared Ashlar
Ashlar cobalt
Vendors & Products Ashlar Vellum
Ashlar Vellum cobalt
Ashlar
Ashlar cobalt

Thu, 18 Sep 2025 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Ashlar Vellum
Ashlar Vellum cobalt
Vendors & Products Ashlar Vellum
Ashlar Vellum cobalt

Wed, 17 Sep 2025 21:00:00 +0000

Type Values Removed Values Added
Description Ashlar-Vellum Cobalt VC6 File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of VC6 files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated data structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-25944.
Title Ashlar-Vellum Cobalt VC6 File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
Weaknesses CWE-787
References
Metrics cvssV3_0

{'score': 7.8, 'vector': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: zdi

Published:

Updated: 2025-09-17T20:51:57.136Z

Reserved: 2025-07-21T19:49:59.408Z

Link: CVE-2025-7990

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-09-17T21:15:40.580

Modified: 2025-09-17T21:15:40.580

Link: CVE-2025-7990

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-09-18T12:41:19Z