Lucene search

K
cve[email protected]CVE-2022-41196
HistoryOct 11, 2022 - 9:15 p.m.

CVE-2022-41196

2022-10-1121:15:24
CWE-119
CWE-787
web.nvd.nist.gov
28
2
cve-2022-41196
memory management
remote code execution
vrml
sap 3d visual enterprise viewer

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

58.9%

Due to lack of proper memory management, when a victim opens a manipulated VRML Worlds (.wrl, vrml.x3d) file received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of dangling pointer which refers to overwritten space in memory.

Affected configurations

NVD
Node
sap3d_visual_enterprise_viewerRange<9.0

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "SAP 3D Visual Enterprise Viewer",
    "vendor": "SAP SE",
    "versions": [
      {
        "status": "affected",
        "version": "9"
      }
    ]
  }
]

Social References

More

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

58.9%

Related for CVE-2022-41196