Use-After-Free Vulnerability in Trimble SketchUp Viewer
CVE-2024-9725
7.8HIGH
What is CVE-2024-9725?
A vulnerability in Trimble SketchUp Viewer arises from improper handling of SKP file parsing, leading to a use-after-free condition. This security flaw allows remote attackers to execute arbitrary code against installations of the application. The exploitation of this vulnerability requires user interaction, as it necessitates opening a specially crafted SKP file or visiting a malicious webpage. The lack of validation that an object exists before performing operations on it is the core issue that enables this exploit, potentially compromising the user's system and data integrity.
Affected Version(s)
SketchUp Viewer 22.0.316.0
References
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
CVSS V3.0
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
