Remote Code Execution Vulnerability in Luxion KeyShot Viewer Due to KSP File Parsing Stack-Based Buffer Overflow
CVE-2024-5507

7.8HIGH

Key Information:

Vendor
Luxion
Status
Keyshot Viewer
Vendor
CVE Published:
6 June 2024

Summary

A stack-based buffer overflow vulnerability exists in Luxion KeyShot Viewer due to inadequate validation of the length of user-supplied data during the parsing of KSP files. This flaw allows remote attackers to potentially execute arbitrary code on affected systems. Exploitation of this vulnerability requires user interaction, as the user must either visit a malicious web page or open a malicious KSP file. The security risk is considerable, as successful exploitation can lead to unauthorized actions being performed in the context of the user’s session.

Affected Version(s)

KeyShot Viewer 2023.3_12.2.1.2

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.