CVE-2011-10015
Severity CVSS v4.0:
CRITICAL
Type:
CWE-121
Stack-based Buffer Overflow
Publication date:
13/08/2025
Last modified:
14/08/2025
Description
Cytel Studio version 9.0 and earlier is vulnerable to a stack-based buffer overflow triggered by parsing a malformed .CY3 file. The vulnerability occurs when the application copies user-controlled strings into a fixed-size stack buffer (256 bytes) without proper bounds checking. Exploitation allows arbitrary code execution when the crafted file is opened.
Impact
Base Score 4.0
9.30
Severity 4.0
CRITICAL
References to Advisories, Solutions, and Tools
- http://aluigi.altervista.org/adv/cytel_1-adv.txt
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/fileformat/cytel_studio_cy3.rb
- https://web.archive.org/web/20110301000000*/http://www.cytel.com/Software/StatXact.aspx
- https://web.archive.org/web/20110708215826/http://www.cytel.com/Software/LogXact.aspx
- https://web.archive.org/web/20110708215830/http://www.cytel.com/Software/StatXact.aspx
- https://www.exploit-db.com/exploits/17930
- https://www.exploit-db.com/exploits/18027
- https://www.vulncheck.com/advisories/cytel-studio-cy3-file-stack-buffer-overflow
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/fileformat/cytel_studio_cy3.rb
- https://www.exploit-db.com/exploits/18027



