2024-04-04 08:46:00 +00:00

130 lines
4.3 KiB
JSON

{
"id": "CVE-2022-41211",
"sourceIdentifier": "cna@sap.com",
"published": "2022-11-08T22:15:18.623",
"lastModified": "2023-07-10T21:15:10.447",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Due to lack of proper memory management, when a victim opens manipulated file received from untrusted sources in SAP 3D Visual Enterprise Author and SAP 3D Visual Enterprise Viewer, Arbitrary Code Execution can be triggered when payload forces:Re-use of dangling pointer which refers to overwritten space in memory. The accessed memory must be filled with code to execute the attack. Therefore, repeated success is unlikely.Stack-based buffer overflow. Since the memory overwritten is random, based on access rights of the memory, repeated success is not assured.\n\n"
},
{
"lang": "es",
"value": "Debido a la falta de una gesti\u00f3n adecuada de la memoria, cuando una v\u00edctima abre un archivo manipulado recibido de fuentes no confiables en SAP 3D Visual Enterprise Author y SAP 3D Visual Enterprise Viewer, se puede activar la ejecuci\u00f3n de c\u00f3digo arbitrario cuando el payload fuerza: Reutilizaci\u00f3n del puntero colgante que se refiere a espacio sobrescrito en la memoria. La memoria a la que se accede debe llenarse con c\u00f3digo para ejecutar el ataque. Por lo tanto, es poco probable que se repita el \u00e9xito. Desbordamiento de b\u00fafer. Dado que la memoria sobrescrita es aleatoria, seg\u00fan los derechos de acceso a la memoria, no se garantiza el \u00e9xito repetido."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "cna@sap.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.0,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "cna@sap.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sap:3d_visual_enterprise_author:9:*:*:*:*:*:*:*",
"matchCriteriaId": "74688C75-CA19-4742-AB05-5EBAC38C5A82"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sap:3d_visual_enterprise_viewer:9:*:*:*:*:*:*:*",
"matchCriteriaId": "C2FAD1A0-EEA0-476D-A00A-07E918F9606F"
}
]
}
]
}
],
"references": [
{
"url": "https://launchpad.support.sap.com/#/notes/3263436",
"source": "cna@sap.com",
"tags": [
"Permissions Required",
"Vendor Advisory"
]
},
{
"url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html",
"source": "cna@sap.com",
"tags": [
"Vendor Advisory"
]
}
]
}