Description
Cytel Studio version 9.0 and earlier is vulnerable to a stack-based buffer overflow triggered by parsing a malformed .CY3 file. The vulnerability occurs when the application copies user-controlled strings into a fixed-size stack buffer (256 bytes) without proper bounds checking. Exploitation allows arbitrary code execution when the crafted file is opened.
Problem types
CWE-121 Stack-based Buffer Overflow
Product status
*
Credits
Luigi Auriemma
References
raw.githubusercontent.com/.../fileformat/cytel_studio_cy3.rb
www.exploit-db.com/exploits/17930
www.exploit-db.com/exploits/18027
aluigi.altervista.org/adv/cytel_1-adv.txt
web.archive.org/...ttp://www.cytel.com/Software/LogXact.aspx
web.archive.org/...tp://www.cytel.com/Software/StatXact.aspx
web.archive.org/...tp://www.cytel.com/Software/StatXact.aspx
www.vulncheck.com/...l-studio-cy3-file-stack-buffer-overflow