Ashlar-Vellum Cobalt VC6 File Parsing Type Confusion Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of VC6 files. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-25238.
                
            Metrics
Affected Vendors & Products
References
        | Link | Providers | 
|---|---|
| https://www.zerodayinitiative.com/advisories/ZDI-25-117/ | 
                     | 
            
History
                    Fri, 08 Aug 2025 17:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| CPEs | cpe:2.3:a:ashlar:cobalt:12.0.1204.91:*:*:*:*:*:*:* | 
Fri, 11 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        
        epss
         
  | 
    
        
        
        epss
         
  | 
Mon, 07 Jul 2025 18:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | 
        
        Ashlar
         Ashlar cobalt  | 
|
| CPEs | cpe:2.3:a:ashlar:cobalt:1204.91:*:*:*:*:*:*:* | |
| Vendors & Products | 
        
        Ashlar
         Ashlar cobalt  | 
Wed, 12 Mar 2025 15:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        ssvc
         
  | 
Tue, 11 Mar 2025 21:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | Ashlar-Vellum Cobalt VC6 File Parsing Type Confusion Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of VC6 files. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-25238. | |
| Title | Ashlar-Vellum Cobalt VC6 File Parsing Type Confusion Remote Code Execution Vulnerability | |
| Weaknesses | CWE-843 | |
| References | 
         | |
| Metrics | 
        
        cvssV3_0
         
  | 
Status: PUBLISHED
Assigner: zdi
Published: 2025-03-11T20:42:47.162Z
Updated: 2025-03-12T14:41:38.006Z
Reserved: 2025-03-05T23:40:09.733Z
Link: CVE-2025-2016
Updated: 2025-03-12T14:25:58.336Z
Status : Analyzed
Published: 2025-03-11T21:15:52.903
Modified: 2025-08-08T17:21:21.503
Link: CVE-2025-2016
No data.
ReportizFlow