Remote Code Execution Vulnerability in Luxion KeyShot Viewer Due to KSP File Parsing Stack-Based Buffer Overflow
CVE-2024-5507
7.8HIGH
Summary
A stack-based buffer overflow vulnerability exists in Luxion KeyShot Viewer due to inadequate validation of the length of user-supplied data during the parsing of KSP files. This flaw allows remote attackers to potentially execute arbitrary code on affected systems. Exploitation of this vulnerability requires user interaction, as the user must either visit a malicious web page or open a malicious KSP file. The security risk is considerable, as successful exploitation can lead to unauthorized actions being performed in the context of the user’s session.
Affected Version(s)
KeyShot Viewer 2023.3_12.2.1.2
References
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved