The affected product is vulnerable to an out-of-bounds write while processing project files, which allows an attacker to craft a project file that would allow arbitrary code execution.
Solution:
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-22-055-01 | third party advisory us government resource |
https://www.zerodayinitiative.com/advisories/ZDI-22-432/ | vdb entry third party advisory |
https://www.zerodayinitiative.com/advisories/ZDI-22-434/ | vdb entry third party advisory |
https://www.zerodayinitiative.com/advisories/ZDI-22-437/ | vdb entry third party advisory |
https://www.zerodayinitiative.com/advisories/ZDI-22-440/ | vdb entry third party advisory |
https://www.zerodayinitiative.com/advisories/ZDI-22-433/ | vdb entry third party advisory |
https://www.zerodayinitiative.com/advisories/ZDI-22-438/ | vdb entry third party advisory |