Source URL: https://blog.talosintelligence.com/catdoc-zero-day-nvidia-high-logic-fontcreator-and-parallel-vulnerabilities/
Source: Cisco Talos Blog
Title: catdoc zero-day, NVIDIA, High-Logic FontCreator and Parallel vulnerabilities
Feedly Summary: Cisco Talos’ Vulnerability Discovery & Research team recently disclosed three zero-day vulnerabilities in catdoc, as well as vulnerabilities in Parallel, NVIDIA and High-Logic FontCreator 15.
AI Summary and Description: Yes
Summary: The disclosed vulnerabilities highlight significant security risks across multiple software applications, including catdoc, Parallels, NVIDIA utilities, and High-Logic FontCreator. These vulnerabilities present opportunities for attackers to exploit memory corruption, privilege escalation, and sensitive information disclosure.
Detailed Description: The text discusses several critical zero-day vulnerabilities in various software tools, underscoring the need for ongoing vigilance and prompt patching of security flaws. Key points include:
– **Zero-Day Vulnerabilities**:
– Cisco Talos discovered three zero-day vulnerabilities in the catdoc utility, which translates documents from Microsoft Office formats to plain text.
– The catdoc vulnerabilities include:
– **Memory Corruption Vulnerability (CVE-2024-48877)**: Triggered by a specially crafted file that can lead to heap buffer overflow.
– **Integer Overflow Vulnerability (CVE-2024-52035)**: Associated with a flaw in how catdoc handles document file allocation.
– **Integer Underflow Vulnerability (CVE-2024-54028)**: Also causing heap-based memory corruption.
– **Other Vulnerabilities**:
– **Parallels Desktop**: Multiple privilege escalation vulnerabilities were discovered. They allow attackers to exploit a restoration or snapshot process in virtual machines:
– **Directory Traversal Vulnerability (CVE-2025-31359)**.
– **Privilege Escalation through Hard Links (CVE-2024-36486, CVE-2024-54189, CVE-2024-52561)**.
– **NVIDIA Vulnerability (CVE-2025-23247)**:
– An integer overflow identified in the NVIDIA cuobjdump utility that may allow for out-of-bounds write if a malicious CUDA file is provided.
– **High-Logic FontCreator Vulnerability (CVE-2025-20001)**:
– An out-of-bounds reading vulnerability could expose sensitive information if a user is tricked into opening a compromised font file.
These vulnerabilities reinforce the essential role of proactive security measures, including timely patch management and vulnerability discovery processes, especially for third-party applications. Security professionals must remain vigilant and leverage resources like Cisco Talos’ advisories and Snort rule sets to enhance detection and mitigation strategies.