Ashlar-Vellum Graphite VC6 File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Graphite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of VC6 files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-25463.
References
Link | Resource |
---|---|
https://www.zerodayinitiative.com/advisories/ZDI-25-633/ | Third Party Advisory |
Configurations
History
22 Sep 2025, 20:50
Type | Values Removed | Values Added |
---|---|---|
First Time |
Ashlar
Ashlar graphite |
|
CPE | cpe:2.3:a:ashlar:graphite:13.0.48:*:*:*:*:*:*:* | |
References | () https://www.zerodayinitiative.com/advisories/ZDI-25-633/ - Third Party Advisory |
17 Sep 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-09-17 21:15
Updated : 2025-09-22 20:50
NVD link : CVE-2025-7979
Mitre link : CVE-2025-7979
CVE.ORG link : CVE-2025-7979
JSON object : View
Products Affected
ashlar
- graphite
CWE
CWE-121
Stack-based Buffer Overflow