Stack-based Buffer Overflow in Trimble SketchUp Viewer
CVE-2024-9726
7.8HIGH
What is CVE-2024-9726?
The vulnerability within Trimble SketchUp Viewer arises from improper validation of user-supplied data length during the parsing of SKP files. This oversight allows remote attackers to exploit the application's stack-based buffer, leading to the potential execution of arbitrary code within the context of the affected process. Successful exploitation necessitates user interaction, requiring the target to either visit a malicious webpage or open a compromised SKP file. Attackers can leverage this flaw to gain unauthorized control over the application, potentially leading to serious repercussions for affected users.
Affected Version(s)
SketchUp Viewer 22.0.316.0
References
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
CVSS V3.0
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
