The affected product is vulnerable to an out-of-bounds read while processing project files, which allows an attacker to craft a project file that would allow arbitrary code execution.
Solution:
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-22-055-01 | third party advisory us government resource |
https://www.zerodayinitiative.com/advisories/ZDI-22-439/ | vdb entry third party advisory |
https://www.zerodayinitiative.com/advisories/ZDI-22-436/ | vdb entry third party advisory |
https://www.zerodayinitiative.com/advisories/ZDI-22-435/ | vdb entry third party advisory |