Cytel Studio version 9.0 and earlier is vulnerable to a stack-based buffer overflow triggered by parsing a malformed .CY3 file. The vulnerability occurs when the application copies user-controlled strings into a fixed-size stack buffer (256 bytes) without proper bounds checking. Exploitation allows arbitrary code execution when the crafted file is opened.
CVSS
No CVSS.
References
Configurations
No configuration.
History
14 Aug 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/fileformat/cytel_studio_cy3.rb - | |
References | () https://www.exploit-db.com/exploits/18027 - |
14 Aug 2025, 13:11
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
13 Aug 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-13 21:15
Updated : 2025-08-14 15:15
NVD link : CVE-2011-10015
Mitre link : CVE-2011-10015
CVE.ORG link : CVE-2011-10015
JSON object : View
Products Affected
No product.
CWE
CWE-121
Stack-based Buffer Overflow