Lucene search

K
zdiSimon Janz (@esj4y)ZDI-24-541
HistoryMay 31, 2024 - 12:00 a.m.

Luxion KeyShot Viewer KSP File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability

2024-05-3100:00:00
Simon Janz (@esj4y)
www.zerodayinitiative.com
5
remote code execution
luxion keyshot viewer
ksp file parsing
stack-based buffer overflow
user interaction
malicious page
malicious file
lack of validation

AI Score

7.2

Confidence

High

EPSS

0.001

Percentile

22.3%

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Luxion KeyShot Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of KSP files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.

AI Score

7.2

Confidence

High

EPSS

0.001

Percentile

22.3%

Related for ZDI-24-541