There is a memory corruption vulnerability due to a stack...
High severity
Unreviewed
Published
May 15, 2025
to the GitHub Advisory Database
•
Updated May 20, 2025
Description
Published by the National Vulnerability Database
May 15, 2025
Published to the GitHub Advisory Database
May 15, 2025
Last updated
May 20, 2025
There is a memory corruption vulnerability due to a stack-based buffer overflow in DrObjectStorage::XML_Serialize() when using the SymbolEditor in NI Circuit Design Suite. This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted .sym file. This vulnerability affects NI Circuit Design Suite 14.3.0 and prior versions.
References