Home

Description

Lattice Semiconductor ispVM System v18.0.2 contains a buffer overflow vulnerability in its handling of .xcf project files. When parsing the version attribute of the ispXCF XML tag, the application fails to properly validate input length, allowing a specially crafted file to overwrite memory on the stack. This can result in arbitrary code execution under the context of the user who opens the file. The vulnerability is triggered locally by opening a malicious .xcf file and does not require elevated privileges.

PUBLISHED Reserved 2025-08-11 | Published 2025-08-13 | Updated 2025-08-14 | Assigner VulnCheck




HIGH: 8.4CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-121 Stack-based Buffer Overflow

Product status

Default status
unknown

18.0.2
affected

Credits

Anonymous person via Secunia finder

References

raw.githubusercontent.com/.../fileformat/ispvm_xcf_ispxcf.rb exploit

www.exploit-db.com/exploits/18947 exploit

web.archive.org/...2756/http://secunia.com/advisories/48740/ technical-description exploit

www.latticesemi.com/ispvm product

www.vulncheck.com/...ystem-xcf-file-handling-buffer-overflow third-party-advisory

cve.org (CVE-2012-10057)

nvd.nist.gov (CVE-2012-10057)

Download JSON