CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Lifecycle Timeline
3Tags
Description
InCopy versions 20.2, 19.5.3 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
Analysis
Heap-based buffer overflow vulnerability in Adobe InCopy versions 20.2, 19.5.3 and earlier that allows arbitrary code execution with the privileges of the current user. The vulnerability requires user interaction (opening a malicious file) and presents a high-severity risk due to its direct code execution capability; exploitation likelihood and real-world attack status cannot be fully assessed without KEV confirmation or public POC availability.
Technical Context
The vulnerability exists as a CWE-122 (Heap-based Buffer Overflow) in Adobe InCopy, a professional writing and editing component of the Creative Cloud suite. Heap-based buffer overflows occur when data written to a heap buffer exceeds its allocated size, corrupting adjacent heap metadata and potentially allowing attackers to overwrite function pointers, virtual method tables, or other critical data structures. The affected CPE likely corresponds to cpe:2.3:a:adobe:incopy:* with version constraints <=20.2 and <=19.5.3 (legacy branch). InCopy's file parsing routines (likely handling native .icml or linked document formats) fail to perform adequate bounds checking during buffer operations, enabling an attacker to craft a malicious document that triggers the overflow when processed.
Affected Products
Adobe InCopy (['20.2 and earlier', '19.5.3 and earlier (legacy branch)'])
Remediation
- action: Apply vendor patch; details: Update Adobe InCopy to a patched version released after CVE-2025-47107 disclosure. Check Adobe's official security bulletin for specific build numbers. Versions >20.2 and >19.5.3 (if still supported) should resolve the heap buffer overflow. - action: Restrict document sources; details: Implement organizational policy to open InCopy documents (.icml, linked files) only from trusted sources until patching is complete. Use file isolation tools or sandboxed environments for document preview/review from untrusted senders. - action: Monitor for exploitation indicators; details: Analyze system logs for unexpected process spawning from InCopy, unusual memory access patterns, or application crashes. Endpoint Detection and Response (EDR) tools should flag heap exploitation techniques. - action: Vendor advisory reference; details: Consult Adobe Security Advisory (APSB-2025-XX or equivalent) for definitive patch versions, timeline, and workaround specifics. Adobe typically publishes patches on Patch Tuesday or ad-hoc for critical vulnerabilities.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-17811