CVE-2023-27566
📋 TL;DR
CVE-2023-27566 is an out-of-bounds write vulnerability in Live2D Cubism Editor's Cubism Core component that allows attackers to execute arbitrary code or cause denial of service by crafting malicious MOC3 files. This affects users who process untrusted MOC3 files with vulnerable versions of Live2D Cubism Editor or applications using the Cubism SDK. The vulnerability is triggered when parsing specially crafted Section Offset Tables or Count Info Tables.
💻 Affected Systems
- Live2D Cubism Editor
- Applications using Live2D Cubism SDK
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to complete system compromise, data theft, or ransomware deployment when processing malicious MOC3 files.
Likely Case
Application crash or denial of service when processing malformed MOC3 files, potentially disrupting workflows in animation/game development environments.
If Mitigated
Limited impact with proper file validation and sandboxing, potentially only causing application crashes without code execution.
🎯 Exploit Status
Exploitation requires the victim to open/process a malicious MOC3 file. Public proof-of-concept exists in the moc3ingbird repository demonstrating the vulnerability.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Cubism Editor 4.2.04 and later
Vendor Advisory: https://docs.live2d.com/cubism-editor-manual/updates4/
Restart Required: Yes
Instructions:
1. Download Cubism Editor 4.2.04 or later from official Live2D website. 2. Uninstall previous version. 3. Install updated version. 4. Restart system. 5. For applications using Cubism SDK: update to patched SDK version and recompile.
🔧 Temporary Workarounds
File validation and sanitization
allImplement strict validation of MOC3 file structure before processing, rejecting files with malformed Section Offset Tables or Count Info Tables.
Sandbox execution
allRun Cubism Editor or affected applications in isolated environments or containers with limited permissions.
🧯 If You Can't Patch
- Restrict MOC3 file processing to trusted sources only
- Implement application allowlisting to prevent execution of vulnerable versions
🔍 How to Verify
Check if Vulnerable:
Check Cubism Editor version via Help > About menu. For applications: check linked Cubism Core library version.
Check Version:
On Windows: Check program version in Control Panel > Programs. On macOS: Check application version in Finder > Get Info.
Verify Fix Applied:
Verify installed version is 4.2.04 or later. Test with known malicious MOC3 files from moc3ingbird repository (in safe environment).
📡 Detection & Monitoring
Log Indicators:
- Application crashes with memory access violations
- Unexpected file parsing errors in MOC3 processing logs
- Abnormal process termination when handling MOC3 files
Network Indicators:
- Unusual MOC3 file downloads to development systems
- File uploads to applications processing MOC3 files
SIEM Query:
Process:name="Cubism Editor" AND (EventID:1000 OR ExceptionCode:c0000005) OR FileHash:known_malicious_moc3_hash
🔗 References
- https://docs.live2d.com/cubism-editor-manual/updates4/
- https://github.com/openl2d/moc3ingbird
- https://news.ycombinator.com/item?id=35013098
- https://undeleted.ronsor.com/live2d-a-security-trainwreck/
- https://docs.live2d.com/cubism-editor-manual/updates4/
- https://github.com/openl2d/moc3ingbird
- https://news.ycombinator.com/item?id=35013098
- https://undeleted.ronsor.com/live2d-a-security-trainwreck/