All the vulnerabilites related to Luxion - KeyShot
cve-2021-22649
Vulnerability from cvelistv5
Published
2021-02-23 03:02
Modified
2024-08-03 18:51
Severity ?
EPSS score ?
Summary
Luxion KeyShot versions prior to 10.1, Luxion KeyShot Viewer versions prior to 10.1, Luxion KeyShot Network Rendering versions prior to 10.1, and Luxion KeyVR versions prior to 10.1 have multiple NULL pointer dereference issues while processing project files, which may allow an attacker to execute arbitrary code.
References
▼ | URL | Tags |
---|---|---|
https://us-cert.cisa.gov/ics/advisories/icsa-21-035-01 | x_refsource_MISC | |
https://cert-portal.siemens.com/productcert/pdf/ssa-231216.pdf | x_refsource_CONFIRM | |
https://www.zerodayinitiative.com/advisories/ZDI-21-317/ | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-21-325/ | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:51:05.823Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-035-01" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-231216.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-317/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-325/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Luxion KeyShot", "vendor": "n/a", "versions": [ { "status": "affected", "version": "versions prior to 10.1" } ] }, { "product": "Luxion KeyShot Viewer", "vendor": "n/a", "versions": [ { "status": "affected", "version": "versions prior to 10.1" } ] }, { "product": "Luxion KeyShot Network Rendering", "vendor": "n/a", "versions": [ { "status": "affected", "version": "versions prior to 10.1" } ] }, { "product": "Luxion KeyVR", "vendor": "n/a", "versions": [ { "status": "affected", "version": "versions prior to 10.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Luxion KeyShot versions prior to 10.1, Luxion KeyShot Viewer versions prior to 10.1, Luxion KeyShot Network Rendering versions prior to 10.1, and Luxion KeyVR versions prior to 10.1 have multiple NULL pointer dereference issues while processing project files, which may allow an attacker to execute arbitrary code." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-822", "description": "UNTRUSTED POINTER DEREFERENCE CWE-822", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-03-16T23:07:09", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-035-01" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-231216.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-317/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-325/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2021-22649", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Luxion KeyShot", "version": { "version_data": [ { "version_value": "versions prior to 10.1" } ] } }, { "product_name": "Luxion KeyShot Viewer", "version": { "version_data": [ { "version_value": "versions prior to 10.1" } ] } }, { "product_name": "Luxion KeyShot Network Rendering", "version": { "version_data": [ { "version_value": "versions prior to 10.1" } ] } }, { "product_name": "Luxion KeyVR", "version": { "version_data": [ { "version_value": "versions prior to 10.1" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Luxion KeyShot versions prior to 10.1, Luxion KeyShot Viewer versions prior to 10.1, Luxion KeyShot Network Rendering versions prior to 10.1, and Luxion KeyVR versions prior to 10.1 have multiple NULL pointer dereference issues while processing project files, which may allow an attacker to execute arbitrary code." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "UNTRUSTED POINTER DEREFERENCE CWE-822" } ] } ] }, "references": { "reference_data": [ { "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-035-01", "refsource": "MISC", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-035-01" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-231216.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-231216.pdf" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-317/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-317/" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-325/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-325/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2021-22649", "datePublished": "2021-02-23T03:02:05", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:51:05.823Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-27488
Vulnerability from cvelistv5
Published
2021-05-27 15:37
Modified
2024-08-03 21:26
Severity ?
EPSS score ?
Summary
Datakit Software libraries CatiaV5_3dRead, CatiaV6_3dRead, Step3dRead, Ug3dReadPsr, Jt3dReadPsr modules in KeyShot Versions v10.1 and prior lack proper validation of user-supplied data when parsing CATPart files. This could result in an out-of-bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process.
References
▼ | URL | Tags |
---|---|---|
https://www.zerodayinitiative.com/advisories/ZDI-21-563/ | x_refsource_MISC | |
https://cert-portal.siemens.com/productcert/pdf/ssa-119468.pdf | x_refsource_CONFIRM | |
https://us-cert.cisa.gov/ics/advisories/icsa-21-145-01 | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T21:26:08.930Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-563/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-119468.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-145-01" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Datakit Software libraries embedded in Luxion KeyShot software", "vendor": "n/a", "versions": [ { "status": "affected", "version": "CatiaV5_3dRead, CatiaV6_3dRead, Step3dRead, Ug3dReadPsr, Jt3dReadPsr modules in KeyShot Versions v10.1 and prior" } ] } ], "descriptions": [ { "lang": "en", "value": "Datakit Software libraries CatiaV5_3dRead, CatiaV6_3dRead, Step3dRead, Ug3dReadPsr, Jt3dReadPsr modules in KeyShot Versions v10.1 and prior lack proper validation of user-supplied data when parsing CATPart files. This could result in an out-of-bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "OUT-OF-BOUNDS WRITE CWE-787", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-05-27T15:41:38", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-563/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-119468.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-145-01" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2021-27488", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Datakit Software libraries embedded in Luxion KeyShot software", "version": { "version_data": [ { "version_value": "CatiaV5_3dRead, CatiaV6_3dRead, Step3dRead, Ug3dReadPsr, Jt3dReadPsr modules in KeyShot Versions v10.1 and prior" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Datakit Software libraries CatiaV5_3dRead, CatiaV6_3dRead, Step3dRead, Ug3dReadPsr, Jt3dReadPsr modules in KeyShot Versions v10.1 and prior lack proper validation of user-supplied data when parsing CATPart files. This could result in an out-of-bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "OUT-OF-BOUNDS WRITE CWE-787" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-563/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-563/" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-119468.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-119468.pdf" }, { "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-145-01", "refsource": "MISC", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-145-01" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2021-27488", "datePublished": "2021-05-27T15:37:25", "dateReserved": "2021-02-19T00:00:00", "dateUpdated": "2024-08-03T21:26:08.930Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-27492
Vulnerability from cvelistv5
Published
2021-05-27 15:41
Modified
2024-08-03 21:26
Severity ?
EPSS score ?
Summary
When opening a specially crafted 3DXML file, the application containing Datakit Software libraries CatiaV5_3dRead, CatiaV6_3dRead, Step3dRead, Ug3dReadPsr, Jt3dReadPsr modules in KeyShot Versions v10.1 and prior could disclose arbitrary files to remote attackers. This is because of the passing of specially crafted content to the underlying XML parser without taking proper restrictions such as prohibiting an external DTD.
References
▼ | URL | Tags |
---|---|---|
https://www.zerodayinitiative.com/advisories/ZDI-21-567/ | x_refsource_MISC | |
https://cert-portal.siemens.com/productcert/pdf/ssa-119468.pdf | x_refsource_CONFIRM | |
https://us-cert.cisa.gov/ics/advisories/icsa-21-145-01 | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T21:26:08.955Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-567/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-119468.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-145-01" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Datakit Software libraries embedded in Luxion KeyShot software", "vendor": "n/a", "versions": [ { "status": "affected", "version": "CatiaV5_3dRead, CatiaV6_3dRead, Step3dRead, Ug3dReadPsr, Jt3dReadPsr modules in KeyShot Versions v10.1 and prior" } ] } ], "descriptions": [ { "lang": "en", "value": "When opening a specially crafted 3DXML file, the application containing Datakit Software libraries CatiaV5_3dRead, CatiaV6_3dRead, Step3dRead, Ug3dReadPsr, Jt3dReadPsr modules in KeyShot Versions v10.1 and prior could disclose arbitrary files to remote attackers. This is because of the passing of specially crafted content to the underlying XML parser without taking proper restrictions such as prohibiting an external DTD." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-611", "description": "IMPROPER RESTRICTIONS ON XML EXTERNAL ENTITY REFERENCE CWE-611", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-05-27T15:42:11", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-567/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-119468.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-145-01" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2021-27492", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Datakit Software libraries embedded in Luxion KeyShot software", "version": { "version_data": [ { "version_value": "CatiaV5_3dRead, CatiaV6_3dRead, Step3dRead, Ug3dReadPsr, Jt3dReadPsr modules in KeyShot Versions v10.1 and prior" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "When opening a specially crafted 3DXML file, the application containing Datakit Software libraries CatiaV5_3dRead, CatiaV6_3dRead, Step3dRead, Ug3dReadPsr, Jt3dReadPsr modules in KeyShot Versions v10.1 and prior could disclose arbitrary files to remote attackers. This is because of the passing of specially crafted content to the underlying XML parser without taking proper restrictions such as prohibiting an external DTD." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "IMPROPER RESTRICTIONS ON XML EXTERNAL ENTITY REFERENCE CWE-611" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-567/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-567/" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-119468.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-119468.pdf" }, { "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-145-01", "refsource": "MISC", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-145-01" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2021-27492", "datePublished": "2021-05-27T15:41:49", "dateReserved": "2021-02-19T00:00:00", "dateUpdated": "2024-08-03T21:26:08.955Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-5506
Vulnerability from cvelistv5
Published
2024-06-06 17:52
Modified
2024-08-01 21:18
Severity ?
EPSS score ?
Summary
Luxion KeyShot Viewer KSP File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://www.zerodayinitiative.com/advisories/ZDI-24-538/ | x_research-advisory | |
https://www.keyshot.com/csirt/ | vendor-advisory |
Impacted products
▼ | Vendor | Product |
---|---|---|
Luxion | KeyShot Viewer |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:luxion:keyshot_viewer:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "keyshot_viewer", "vendor": "luxion", "versions": [ { "status": "affected", "version": "2023.3_12.2.1.2" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-5506", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-06-06T18:33:11.255930Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-06T18:37:55.313Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T21:18:06.331Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ZDI-24-538", "tags": [ "x_research-advisory", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-538/" }, { "name": "vendor-provided URL", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.keyshot.com/csirt/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "KeyShot Viewer", "vendor": "Luxion", "versions": [ { "status": "affected", "version": "2023.3_12.2.1.2" } ] } ], "dateAssigned": "2024-05-29T16:48:04.013-05:00", "datePublic": "2024-05-31T11:34:19.786-05:00", "descriptions": [ { "lang": "en", "value": "Luxion KeyShot Viewer KSP File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Luxion KeyShot Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of KSP files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22514." } ], "metrics": [ { "cvssV3_0": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787: Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-06T17:52:00.097Z", "orgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "shortName": "zdi" }, "references": [ { "name": "ZDI-24-538", "tags": [ "x_research-advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-538/" }, { "name": "vendor-provided URL", "tags": [ "vendor-advisory" ], "url": "https://www.keyshot.com/csirt/" } ], "source": { "lang": "en", "value": "Simon Janz (@esj4y)" }, "title": "Luxion KeyShot Viewer KSP File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability" } }, "cveMetadata": { "assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "assignerShortName": "zdi", "cveId": "CVE-2024-5506", "datePublished": "2024-06-06T17:52:00.097Z", "dateReserved": "2024-05-29T21:48:03.983Z", "dateUpdated": "2024-08-01T21:18:06.331Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-30375
Vulnerability from cvelistv5
Published
2024-06-06 17:47
Modified
2024-08-02 01:32
Severity ?
EPSS score ?
Summary
Luxion KeyShot Viewer KSP File Parsing Use-After-Free Remote Code Execution Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://www.zerodayinitiative.com/advisories/ZDI-24-565/ | x_research-advisory |
Impacted products
▼ | Vendor | Product |
---|---|---|
Luxion | KeyShot Viewer |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-30375", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-06-06T19:58:04.638555Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-06T19:58:18.646Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T01:32:07.184Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ZDI-24-565", "tags": [ "x_research-advisory", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-565/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "KeyShot Viewer", "vendor": "Luxion", "versions": [ { "status": "affected", "version": "2023.3_12.2.1.2" } ] } ], "dateAssigned": "2024-03-26T14:40:42.753-05:00", "datePublic": "2024-06-05T08:23:40.445-05:00", "descriptions": [ { "lang": "en", "value": "Luxion KeyShot Viewer KSP File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Luxion KeyShot Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of KSP files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22515." } ], "metrics": [ { "cvssV3_0": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416: Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-06T17:47:57.504Z", "orgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "shortName": "zdi" }, "references": [ { "name": "ZDI-24-565", "tags": [ "x_research-advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-565/" } ], "source": { "lang": "en", "value": "Simon Janz (@esj4y)" }, "title": "Luxion KeyShot Viewer KSP File Parsing Use-After-Free Remote Code Execution Vulnerability" } }, "cveMetadata": { "assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "assignerShortName": "zdi", "cveId": "CVE-2024-30375", "datePublished": "2024-06-06T17:47:57.504Z", "dateReserved": "2024-03-26T18:52:36.420Z", "dateUpdated": "2024-08-02T01:32:07.184Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-11581
Vulnerability from cvelistv5
Published
2024-11-22 20:44
Modified
2024-11-22 20:44
Severity ?
EPSS score ?
Summary
Luxion KeyShot JT File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability
References
{ "containers": { "cna": { "affected": [ { "defaultStatus": "unknown", "product": "KeyShot", "vendor": "Luxion", "versions": [ { "status": "affected", "version": "2024 13.0.0 Build 92 4.10.171" } ] } ], "dateAssigned": "2024-11-20T16:00:59.203-06:00", "datePublic": "2024-11-21T15:25:01.421-06:00", "descriptions": [ { "lang": "en", "value": "Luxion KeyShot JT File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Luxion KeyShot. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of jt files. The issue results from the lack of proper validation of user-supplied data, which can result in a read before the start of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-23826." } ], "metrics": [ { "cvssV3_0": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125: Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-22T20:44:07.235Z", "orgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "shortName": "zdi" }, "references": [ { "name": "ZDI-24-1612", "tags": [ "x_research-advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1612/" }, { "name": "vendor-provided URL", "tags": [ "vendor-advisory" ], "url": "https://download.keyshot.com/cert/ksa-655925/ksa-655925.pdf?version=1.0\u0026_gl=1*1vzfrlf*_gcl_au*MTIxNTA2Njg4MS4xNzMxNTMwMjIx" } ], "source": { "lang": "en", "value": "Anonymous" }, "title": "Luxion KeyShot JT File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability" } }, "cveMetadata": { "assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "assignerShortName": "zdi", "cveId": "CVE-2024-11581", "datePublished": "2024-11-22T20:44:07.235Z", "dateReserved": "2024-11-20T22:00:59.154Z", "dateUpdated": "2024-11-22T20:44:07.235Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-5508
Vulnerability from cvelistv5
Published
2024-06-06 17:51
Modified
2024-08-01 21:18
Severity ?
EPSS score ?
Summary
Luxion KeyShot Viewer KSP File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://www.zerodayinitiative.com/advisories/ZDI-24-539/ | x_research-advisory | |
https://www.keyshot.com/csirt/ | vendor-advisory |
Impacted products
▼ | Vendor | Product |
---|---|---|
Luxion | KeyShot Viewer |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:luxion:keyshot_viewer:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "keyshot_viewer", "vendor": "luxion", "versions": [ { "lessThan": "2024.1", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-5508", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-05T20:13:55.588638Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-23T16:21:42.581Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T21:18:05.395Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ZDI-24-539", "tags": [ "x_research-advisory", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-539/" }, { "name": "vendor-provided URL", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.keyshot.com/csirt/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "KeyShot Viewer", "vendor": "Luxion", "versions": [ { "status": "affected", "version": "2023.3_12.2.1.2" } ] } ], "dateAssigned": "2024-05-29T16:49:10.290-05:00", "datePublic": "2024-05-31T11:34:35.695-05:00", "descriptions": [ { "lang": "en", "value": "Luxion KeyShot Viewer KSP File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Luxion KeyShot Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of KSP files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22267." } ], "metrics": [ { "cvssV3_0": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787: Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-06T17:51:55.627Z", "orgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "shortName": "zdi" }, "references": [ { "name": "ZDI-24-539", "tags": [ "x_research-advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-539/" }, { "name": "vendor-provided URL", "tags": [ "vendor-advisory" ], "url": "https://www.keyshot.com/csirt/" } ], "source": { "lang": "en", "value": "Simon Janz (@esj4y)" }, "title": "Luxion KeyShot Viewer KSP File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability" } }, "cveMetadata": { "assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "assignerShortName": "zdi", "cveId": "CVE-2024-5508", "datePublished": "2024-06-06T17:51:55.627Z", "dateReserved": "2024-05-29T21:49:10.259Z", "dateUpdated": "2024-08-01T21:18:05.395Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-11580
Vulnerability from cvelistv5
Published
2024-11-22 20:44
Modified
2024-11-22 20:44
Severity ?
EPSS score ?
Summary
Luxion KeyShot ABC File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability
References
{ "containers": { "cna": { "affected": [ { "defaultStatus": "unknown", "product": "KeyShot", "vendor": "Luxion", "versions": [ { "status": "affected", "version": "2024 13.0.0 Build 92 4.10.171" } ] } ], "dateAssigned": "2024-11-20T16:00:55.468-06:00", "datePublic": "2024-11-21T15:24:54.910-06:00", "descriptions": [ { "lang": "en", "value": "Luxion KeyShot ABC File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Luxion KeyShot. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of abc files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-23700." } ], "metrics": [ { "cvssV3_0": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122: Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-22T20:44:02.641Z", "orgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "shortName": "zdi" }, "references": [ { "name": "ZDI-24-1611", "tags": [ "x_research-advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1611/" }, { "name": "vendor-provided URL", "tags": [ "vendor-advisory" ], "url": "https://download.keyshot.com/cert/ksa-655925/ksa-655925.pdf?version=1.0\u0026_gl=1*1vzfrlf*_gcl_au*MTIxNTA2Njg4MS4xNzMxNTMwMjIx" } ], "source": { "lang": "en", "value": "Anonymous" }, "title": "Luxion KeyShot ABC File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability" } }, "cveMetadata": { "assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "assignerShortName": "zdi", "cveId": "CVE-2024-11580", "datePublished": "2024-11-22T20:44:02.641Z", "dateReserved": "2024-11-20T22:00:55.421Z", "dateUpdated": "2024-11-22T20:44:02.641Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-27494
Vulnerability from cvelistv5
Published
2021-05-27 15:26
Modified
2024-08-03 21:26
Severity ?
EPSS score ?
Summary
Datakit Software libraries CatiaV5_3dRead, CatiaV6_3dRead, Step3dRead, Ug3dReadPsr, Jt3dReadPsr modules in KeyShot Versions v10.1 and prior lack proper validation of user-supplied data when parsing STP files. This could result in a stack-based buffer overflow. An attacker could leverage this vulnerability to execute code in the context of the current process.
References
▼ | URL | Tags |
---|---|---|
https://www.zerodayinitiative.com/advisories/ZDI-21-564/ | x_refsource_MISC | |
https://cert-portal.siemens.com/productcert/pdf/ssa-119468.pdf | x_refsource_CONFIRM | |
https://us-cert.cisa.gov/ics/advisories/icsa-21-145-01 | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T21:26:08.929Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-564/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-119468.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-145-01" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Datakit Software libraries embedded in Luxion KeyShot software", "vendor": "n/a", "versions": [ { "status": "affected", "version": "CatiaV5_3dRead, CatiaV6_3dRead, Step3dRead, Ug3dReadPsr, Jt3dReadPsr modules in KeyShot Versions v10.1 and prior" } ] } ], "descriptions": [ { "lang": "en", "value": "Datakit Software libraries CatiaV5_3dRead, CatiaV6_3dRead, Step3dRead, Ug3dReadPsr, Jt3dReadPsr modules in KeyShot Versions v10.1 and prior lack proper validation of user-supplied data when parsing STP files. This could result in a stack-based buffer overflow. An attacker could leverage this vulnerability to execute code in the context of the current process." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-121", "description": "STACK-BASED BUFFER OVERFLOW CWE-121", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-05-27T15:26:55", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-564/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-119468.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-145-01" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2021-27494", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Datakit Software libraries embedded in Luxion KeyShot software", "version": { "version_data": [ { "version_value": "CatiaV5_3dRead, CatiaV6_3dRead, Step3dRead, Ug3dReadPsr, Jt3dReadPsr modules in KeyShot Versions v10.1 and prior" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Datakit Software libraries CatiaV5_3dRead, CatiaV6_3dRead, Step3dRead, Ug3dReadPsr, Jt3dReadPsr modules in KeyShot Versions v10.1 and prior lack proper validation of user-supplied data when parsing STP files. This could result in a stack-based buffer overflow. An attacker could leverage this vulnerability to execute code in the context of the current process." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "STACK-BASED BUFFER OVERFLOW CWE-121" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-564/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-564/" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-119468.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-119468.pdf" }, { "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-145-01", "refsource": "MISC", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-145-01" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2021-27494", "datePublished": "2021-05-27T15:26:36", "dateReserved": "2021-02-19T00:00:00", "dateUpdated": "2024-08-03T21:26:08.929Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-11579
Vulnerability from cvelistv5
Published
2024-11-22 20:43
Modified
2024-11-22 20:43
Severity ?
EPSS score ?
Summary
Luxion KeyShot OBJ File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
References
{ "containers": { "cna": { "affected": [ { "defaultStatus": "unknown", "product": "KeyShot", "vendor": "Luxion", "versions": [ { "status": "affected", "version": "2024 13.0.0 Build 92 4.10.171" } ] } ], "dateAssigned": "2024-11-20T16:00:52.282-06:00", "datePublic": "2024-11-21T15:24:44.542-06:00", "descriptions": [ { "lang": "en", "value": "Luxion KeyShot OBJ File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Luxion KeyShot. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of obj files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-23697." } ], "metrics": [ { "cvssV3_0": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787: Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-22T20:43:58.801Z", "orgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "shortName": "zdi" }, "references": [ { "name": "ZDI-24-1610", "tags": [ "x_research-advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1610/" }, { "name": "vendor-provided URL", "tags": [ "vendor-advisory" ], "url": "https://download.keyshot.com/cert/ksa-655925/ksa-655925.pdf?version=1.0\u0026_gl=1*1vzfrlf*_gcl_au*MTIxNTA2Njg4MS4xNzMxNTMwMjIx" } ], "source": { "lang": "en", "value": "Anonymous" }, "title": "Luxion KeyShot OBJ File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability" } }, "cveMetadata": { "assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "assignerShortName": "zdi", "cveId": "CVE-2024-11579", "datePublished": "2024-11-22T20:43:58.801Z", "dateReserved": "2024-11-20T22:00:52.232Z", "dateUpdated": "2024-11-22T20:43:58.801Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22643
Vulnerability from cvelistv5
Published
2021-02-23 03:13
Modified
2024-08-03 18:44
Severity ?
EPSS score ?
Summary
Luxion KeyShot versions prior to 10.1, Luxion KeyShot Viewer versions prior to 10.1, Luxion KeyShot Network Rendering versions prior to 10.1, and Luxion KeyVR versions prior to 10.1 are vulnerable to an out-of-bounds read while processing project files, which may allow an attacker to execute arbitrary code.
References
▼ | URL | Tags |
---|---|---|
https://us-cert.cisa.gov/ics/advisories/icsa-21-035-01 | x_refsource_MISC | |
https://cert-portal.siemens.com/productcert/pdf/ssa-231216.pdf | x_refsource_CONFIRM | |
https://www.zerodayinitiative.com/advisories/ZDI-21-319/ | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-21-316/ | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:14.139Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-035-01" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-231216.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-319/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-316/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Luxion KeyShot", "vendor": "n/a", "versions": [ { "status": "affected", "version": "versions prior to 10.1" } ] }, { "product": "Luxion KeyShot Viewer", "vendor": "n/a", "versions": [ { "status": "affected", "version": "versions prior to 10.1" } ] }, { "product": "Luxion KeyShot Network Rendering", "vendor": "n/a", "versions": [ { "status": "affected", "version": "versions prior to 10.1" } ] }, { "product": "Luxion KeyVR", "vendor": "n/a", "versions": [ { "status": "affected", "version": "versions prior to 10.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Luxion KeyShot versions prior to 10.1, Luxion KeyShot Viewer versions prior to 10.1, Luxion KeyShot Network Rendering versions prior to 10.1, and Luxion KeyVR versions prior to 10.1 are vulnerable to an out-of-bounds read while processing project files, which may allow an attacker to execute arbitrary code." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "OUT-OF-BOUNDS READ CWE-125", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-03-16T23:07:01", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-035-01" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-231216.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-319/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-316/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2021-22643", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Luxion KeyShot", "version": { "version_data": [ { "version_value": "versions prior to 10.1" } ] } }, { "product_name": "Luxion KeyShot Viewer", "version": { "version_data": [ { "version_value": "versions prior to 10.1" } ] } }, { "product_name": "Luxion KeyShot Network Rendering", "version": { "version_data": [ { "version_value": "versions prior to 10.1" } ] } }, { "product_name": "Luxion KeyVR", "version": { "version_data": [ { "version_value": "versions prior to 10.1" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Luxion KeyShot versions prior to 10.1, Luxion KeyShot Viewer versions prior to 10.1, Luxion KeyShot Network Rendering versions prior to 10.1, and Luxion KeyVR versions prior to 10.1 are vulnerable to an out-of-bounds read while processing project files, which may allow an attacker to execute arbitrary code." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "OUT-OF-BOUNDS READ CWE-125" } ] } ] }, "references": { "reference_data": [ { "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-035-01", "refsource": "MISC", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-035-01" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-231216.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-231216.pdf" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-319/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-319/" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-316/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-316/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2021-22643", "datePublished": "2021-02-23T03:13:36", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:14.139Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-11578
Vulnerability from cvelistv5
Published
2024-11-22 20:43
Modified
2024-11-22 20:43
Severity ?
EPSS score ?
Summary
Luxion KeyShot 3DS File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability
References
{ "containers": { "cna": { "affected": [ { "defaultStatus": "unknown", "product": "KeyShot", "vendor": "Luxion", "versions": [ { "status": "affected", "version": "2024 13.0.0 Build 92 4.10.171" } ] } ], "dateAssigned": "2024-11-20T16:00:49.292-06:00", "datePublic": "2024-11-21T15:24:37.269-06:00", "descriptions": [ { "lang": "en", "value": "Luxion KeyShot 3DS File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Luxion KeyShot. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of 3DS files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-23693." } ], "metrics": [ { "cvssV3_0": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-121", "description": "CWE-121: Stack-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-22T20:43:54.601Z", "orgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "shortName": "zdi" }, "references": [ { "name": "ZDI-24-1609", "tags": [ "x_research-advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1609/" }, { "name": "vendor-provided URL", "tags": [ "vendor-advisory" ], "url": "https://download.keyshot.com/cert/ksa-655925/ksa-655925.pdf?version=1.0\u0026_gl=1*1vzfrlf*_gcl_au*MTIxNTA2Njg4MS4xNzMxNTMwMjIx" } ], "source": { "lang": "en", "value": "Anonymous" }, "title": "Luxion KeyShot 3DS File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability" } }, "cveMetadata": { "assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "assignerShortName": "zdi", "cveId": "CVE-2024-11578", "datePublished": "2024-11-22T20:43:54.601Z", "dateReserved": "2024-11-20T22:00:49.233Z", "dateUpdated": "2024-11-22T20:43:54.601Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22651
Vulnerability from cvelistv5
Published
2021-02-23 17:45
Modified
2024-08-03 18:51
Severity ?
EPSS score ?
Summary
When loading a specially crafted file, Luxion KeyShot versions prior to 10.1, Luxion KeyShot Viewer versions prior to 10.1, Luxion KeyShot Network Rendering versions prior to 10.1, and Luxion KeyVR versions prior to 10.1 are, while processing the extraction of temporary files, suffering from a directory traversal vulnerability, which allows an attacker to store arbitrary scripts into automatic startup folders.
References
▼ | URL | Tags |
---|---|---|
https://us-cert.cisa.gov/ics/advisories/icsa-21-035-01 | x_refsource_MISC | |
https://cert-portal.siemens.com/productcert/pdf/ssa-231216.pdf | x_refsource_CONFIRM | |
https://www.zerodayinitiative.com/advisories/ZDI-21-324/ | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:51:07.076Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-035-01" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-231216.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-324/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Luxion KeyShot versions", "vendor": "n/a", "versions": [ { "status": "affected", "version": "versions prior to 10.1" } ] }, { "product": "Luxion KeyShot Viewer", "vendor": "n/a", "versions": [ { "status": "affected", "version": "versions prior to 10.1" } ] }, { "product": "Luxion KeyShot Network Rendering", "vendor": "n/a", "versions": [ { "status": "affected", "version": "versions prior to 10.1" } ] }, { "product": "Luxion KeyVR", "vendor": "n/a", "versions": [ { "status": "affected", "version": "versions prior to 10.1" } ] } ], "descriptions": [ { "lang": "en", "value": "When loading a specially crafted file, Luxion KeyShot versions prior to 10.1, Luxion KeyShot Viewer versions prior to 10.1, Luxion KeyShot Network Rendering versions prior to 10.1, and Luxion KeyVR versions prior to 10.1 are, while processing the extraction of temporary files, suffering from a directory traversal vulnerability, which allows an attacker to store arbitrary scripts into automatic startup folders." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "IMPROPER LIMITATION OF A PATHNAME TO A RESTRICTED DIRECTORY (\u0027PATH TRAVERSAL\u0027) CWE-22", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-03-16T23:07:07", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-035-01" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-231216.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-324/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2021-22651", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Luxion KeyShot versions", "version": { "version_data": [ { "version_value": "versions prior to 10.1" } ] } }, { "product_name": "Luxion KeyShot Viewer", "version": { "version_data": [ { "version_value": "versions prior to 10.1" } ] } }, { "product_name": "Luxion KeyShot Network Rendering", "version": { "version_data": [ { "version_value": "versions prior to 10.1" } ] } }, { "product_name": "Luxion KeyVR", "version": { "version_data": [ { "version_value": "versions prior to 10.1" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "When loading a specially crafted file, Luxion KeyShot versions prior to 10.1, Luxion KeyShot Viewer versions prior to 10.1, Luxion KeyShot Network Rendering versions prior to 10.1, and Luxion KeyVR versions prior to 10.1 are, while processing the extraction of temporary files, suffering from a directory traversal vulnerability, which allows an attacker to store arbitrary scripts into automatic startup folders." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "IMPROPER LIMITATION OF A PATHNAME TO A RESTRICTED DIRECTORY (\u0027PATH TRAVERSAL\u0027) CWE-22" } ] } ] }, "references": { "reference_data": [ { "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-035-01", "refsource": "MISC", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-035-01" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-231216.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-231216.pdf" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-324/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-324/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2021-22651", "datePublished": "2021-02-23T17:45:36", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:51:07.076Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-30374
Vulnerability from cvelistv5
Published
2024-06-06 17:47
Modified
2024-08-02 01:32
Severity ?
EPSS score ?
Summary
Luxion KeyShot Viewer KSP File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://www.zerodayinitiative.com/advisories/ZDI-24-566/ | x_research-advisory |
Impacted products
▼ | Vendor | Product |
---|---|---|
Luxion | KeyShot Viewer |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:luxion:keyshot_viewer:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "keyshot_viewer", "vendor": "luxion", "versions": [ { "status": "affected", "version": "2023.3_12.2.1.2" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-30374", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-06-07T13:53:30.867374Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-07T14:04:02.594Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T01:32:07.218Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ZDI-24-566", "tags": [ "x_research-advisory", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-566/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "KeyShot Viewer", "vendor": "Luxion", "versions": [ { "status": "affected", "version": "2023.3_12.2.1.2" } ] } ], "dateAssigned": "2024-03-26T14:40:42.745-05:00", "datePublic": "2024-06-05T08:23:50.971-05:00", "descriptions": [ { "lang": "en", "value": "Luxion KeyShot Viewer KSP File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Luxion KeyShot Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of KSP files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22449." } ], "metrics": [ { "cvssV3_0": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787: Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-06T17:47:51.570Z", "orgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "shortName": "zdi" }, "references": [ { "name": "ZDI-24-566", "tags": [ "x_research-advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-566/" } ], "source": { "lang": "en", "value": "Simon Janz (@esj4y)" }, "title": "Luxion KeyShot Viewer KSP File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability" } }, "cveMetadata": { "assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "assignerShortName": "zdi", "cveId": "CVE-2024-30374", "datePublished": "2024-06-06T17:47:51.570Z", "dateReserved": "2024-03-26T18:52:36.420Z", "dateUpdated": "2024-08-02T01:32:07.218Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-11576
Vulnerability from cvelistv5
Published
2024-11-22 20:42
Modified
2024-11-22 20:42
Severity ?
EPSS score ?
Summary
Luxion KeyShot 3DS File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability
References
{ "containers": { "cna": { "affected": [ { "defaultStatus": "unknown", "product": "KeyShot", "vendor": "Luxion", "versions": [ { "status": "affected", "version": "2024 13.0.0 Build 92 4.10.171" } ] } ], "dateAssigned": "2024-11-20T16:00:42.308-06:00", "datePublic": "2024-11-21T15:24:23.826-06:00", "descriptions": [ { "lang": "en", "value": "Luxion KeyShot 3DS File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Luxion KeyShot. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of 3DS files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-23681." } ], "metrics": [ { "cvssV3_0": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122: Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-22T20:42:54.741Z", "orgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "shortName": "zdi" }, "references": [ { "name": "ZDI-24-1607", "tags": [ "x_research-advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1607/" }, { "name": "vendor-provided URL", "tags": [ "vendor-advisory" ], "url": "https://download.keyshot.com/cert/ksa-655925/ksa-655925.pdf?version=1.0\u0026_gl=1*1vzfrlf*_gcl_au*MTIxNTA2Njg4MS4xNzMxNTMwMjIx" } ], "source": { "lang": "en", "value": "Anonymous" }, "title": "Luxion KeyShot 3DS File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability" } }, "cveMetadata": { "assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "assignerShortName": "zdi", "cveId": "CVE-2024-11576", "datePublished": "2024-11-22T20:42:54.741Z", "dateReserved": "2024-11-20T22:00:42.175Z", "dateUpdated": "2024-11-22T20:42:54.741Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-27490
Vulnerability from cvelistv5
Published
2021-05-27 16:08
Modified
2024-08-03 21:26
Severity ?
EPSS score ?
Summary
Datakit Software libraries CatiaV5_3dRead, CatiaV6_3dRead, Step3dRead, Ug3dReadPsr, Jt3dReadPsr modules in KeyShot Versions v10.1 and prior are vulnerable to an out-of-bounds read, which may allow an attacker to execute arbitrary code.
References
▼ | URL | Tags |
---|---|---|
https://www.zerodayinitiative.com/advisories/ZDI-21-566/ | x_refsource_MISC | |
https://cert-portal.siemens.com/productcert/pdf/ssa-119468.pdf | x_refsource_CONFIRM | |
https://us-cert.cisa.gov/ics/advisories/icsa-21-145-01 | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T21:26:08.971Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-566/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-119468.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-145-01" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Datakit Software libraries embedded in Luxion KeyShot software", "vendor": "n/a", "versions": [ { "status": "affected", "version": "CatiaV5_3dRead, CatiaV6_3dRead, Step3dRead, Ug3dReadPsr, Jt3dReadPsr modules in KeyShot Versions v10.1 and prior" } ] } ], "descriptions": [ { "lang": "en", "value": "Datakit Software libraries CatiaV5_3dRead, CatiaV6_3dRead, Step3dRead, Ug3dReadPsr, Jt3dReadPsr modules in KeyShot Versions v10.1 and prior are vulnerable to an out-of-bounds read, which may allow an attacker to execute arbitrary code." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "OUT-OF-BOUNDS READ CWE-125", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-05-27T16:08:49", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-566/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-119468.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-145-01" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2021-27490", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Datakit Software libraries embedded in Luxion KeyShot software", "version": { "version_data": [ { "version_value": "CatiaV5_3dRead, CatiaV6_3dRead, Step3dRead, Ug3dReadPsr, Jt3dReadPsr modules in KeyShot Versions v10.1 and prior" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Datakit Software libraries CatiaV5_3dRead, CatiaV6_3dRead, Step3dRead, Ug3dReadPsr, Jt3dReadPsr modules in KeyShot Versions v10.1 and prior are vulnerable to an out-of-bounds read, which may allow an attacker to execute arbitrary code." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "OUT-OF-BOUNDS READ CWE-125" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-566/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-566/" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-119468.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-119468.pdf" }, { "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-145-01", "refsource": "MISC", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-145-01" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2021-27490", "datePublished": "2021-05-27T16:08:18", "dateReserved": "2021-02-19T00:00:00", "dateUpdated": "2024-08-03T21:26:08.971Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-5509
Vulnerability from cvelistv5
Published
2024-06-06 17:51
Modified
2024-08-01 21:18
Severity ?
EPSS score ?
Summary
Luxion KeyShot BIP File Parsing Uncontrolled Search Path Element Remote Code Execution Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://www.zerodayinitiative.com/advisories/ZDI-24-540/ | x_research-advisory | |
https://www.keyshot.com/csirt/ | vendor-advisory |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:luxion:keyshot:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "keyshot", "vendor": "luxion", "versions": [ { "status": "affected", "version": "2023.3.12.2.2.4" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-5509", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-06-07T10:05:16.496885Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-07T10:05:29.139Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T21:18:05.317Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ZDI-24-540", "tags": [ "x_research-advisory", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-540/" }, { "name": "vendor-provided URL", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.keyshot.com/csirt/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "KeyShot", "vendor": "Luxion", "versions": [ { "status": "affected", "version": "2023.3.12.2.2.4" } ] } ], "dateAssigned": "2024-05-29T16:49:37.835-05:00", "datePublic": "2024-05-31T11:34:51.821-05:00", "descriptions": [ { "lang": "en", "value": "Luxion KeyShot BIP File Parsing Uncontrolled Search Path Element Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Luxion KeyShot. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of BIP files. The issue results from loading a library from an unsecured location. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22738." } ], "metrics": [ { "cvssV3_0": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-427", "description": "CWE-427: Uncontrolled Search Path Element", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-06T17:51:50.168Z", "orgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "shortName": "zdi" }, "references": [ { "name": "ZDI-24-540", "tags": [ "x_research-advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-540/" }, { "name": "vendor-provided URL", "tags": [ "vendor-advisory" ], "url": "https://www.keyshot.com/csirt/" } ], "source": { "lang": "en", "value": "Sean de Regge" }, "title": "Luxion KeyShot BIP File Parsing Uncontrolled Search Path Element Remote Code Execution Vulnerability" } }, "cveMetadata": { "assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "assignerShortName": "zdi", "cveId": "CVE-2024-5509", "datePublished": "2024-06-06T17:51:50.168Z", "dateReserved": "2024-05-29T21:49:37.803Z", "dateUpdated": "2024-08-01T21:18:05.317Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22647
Vulnerability from cvelistv5
Published
2021-02-23 03:13
Modified
2024-08-03 18:44
Severity ?
EPSS score ?
Summary
Luxion KeyShot versions prior to 10.1, Luxion KeyShot Viewer versions prior to 10.1, Luxion KeyShot Network Rendering versions prior to 10.1, and Luxion KeyVR versions prior to 10.1 are vulnerable to multiple out-of-bounds write issues while processing project files, which may allow an attacker to execute arbitrary code.
References
▼ | URL | Tags |
---|---|---|
https://us-cert.cisa.gov/ics/advisories/icsa-21-035-01 | x_refsource_MISC | |
https://cert-portal.siemens.com/productcert/pdf/ssa-231216.pdf | x_refsource_CONFIRM | |
https://www.zerodayinitiative.com/advisories/ZDI-21-322/ | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-21-321/ | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-21-320/ | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-21-326/ | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-21-318/ | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:14.057Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-035-01" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-231216.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-322/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-321/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-320/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-326/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-318/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Luxion KeyShot", "vendor": "n/a", "versions": [ { "status": "affected", "version": "versions prior to 10.1" } ] }, { "product": "Luxion KeyShot Viewer", "vendor": "n/a", "versions": [ { "status": "affected", "version": "versions prior to 10.1" } ] }, { "product": "Luxion KeyShot Network Rendering", "vendor": "n/a", "versions": [ { "status": "affected", "version": "versions prior to 10.1" } ] }, { "product": "Luxion KeyVR", "vendor": "n/a", "versions": [ { "status": "affected", "version": "versions prior to 10.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Luxion KeyShot versions prior to 10.1, Luxion KeyShot Viewer versions prior to 10.1, Luxion KeyShot Network Rendering versions prior to 10.1, and Luxion KeyVR versions prior to 10.1 are vulnerable to multiple out-of-bounds write issues while processing project files, which may allow an attacker to execute arbitrary code." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "OUT-OF-BOUNDS WRITE CWE-787", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-03-16T23:07:06", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-035-01" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-231216.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-322/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-321/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-320/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-326/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-318/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2021-22647", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Luxion KeyShot", "version": { "version_data": [ { "version_value": "versions prior to 10.1" } ] } }, { "product_name": "Luxion KeyShot Viewer", "version": { "version_data": [ { "version_value": "versions prior to 10.1" } ] } }, { "product_name": "Luxion KeyShot Network Rendering", "version": { "version_data": [ { "version_value": "versions prior to 10.1" } ] } }, { "product_name": "Luxion KeyVR", "version": { "version_data": [ { "version_value": "versions prior to 10.1" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Luxion KeyShot versions prior to 10.1, Luxion KeyShot Viewer versions prior to 10.1, Luxion KeyShot Network Rendering versions prior to 10.1, and Luxion KeyVR versions prior to 10.1 are vulnerable to multiple out-of-bounds write issues while processing project files, which may allow an attacker to execute arbitrary code." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "OUT-OF-BOUNDS WRITE CWE-787" } ] } ] }, "references": { "reference_data": [ { "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-035-01", "refsource": "MISC", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-035-01" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-231216.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-231216.pdf" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-322/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-322/" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-321/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-321/" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-320/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-320/" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-326/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-326/" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-318/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-318/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2021-22647", "datePublished": "2021-02-23T03:13:39", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:14.057Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-27496
Vulnerability from cvelistv5
Published
2021-05-27 15:27
Modified
2024-08-03 21:26
Severity ?
EPSS score ?
Summary
Datakit Software libraries CatiaV5_3dRead, CatiaV6_3dRead, Step3dRead, Ug3dReadPsr, Jt3dReadPsr modules in KeyShot Versions v10.1 and prior lack proper validation of user-supplied data when parsing PRT files. This could lead to pointer dereferences of a value obtained from an untrusted source. An attacker could leverage this vulnerability to execute code in the context of the current process.
References
▼ | URL | Tags |
---|---|---|
https://www.zerodayinitiative.com/advisories/ZDI-21-565/ | x_refsource_MISC | |
https://cert-portal.siemens.com/productcert/pdf/ssa-119468.pdf | x_refsource_CONFIRM | |
https://us-cert.cisa.gov/ics/advisories/icsa-21-145-01 | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T21:26:08.972Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-565/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-119468.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-145-01" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Datakit Software libraries embedded in Luxion KeyShot software", "vendor": "n/a", "versions": [ { "status": "affected", "version": "CatiaV5_3dRead, CatiaV6_3dRead, Step3dRead, Ug3dReadPsr, Jt3dReadPsr modules in KeyShot Versions v10.1 and prior" } ] } ], "descriptions": [ { "lang": "en", "value": "Datakit Software libraries CatiaV5_3dRead, CatiaV6_3dRead, Step3dRead, Ug3dReadPsr, Jt3dReadPsr modules in KeyShot Versions v10.1 and prior lack proper validation of user-supplied data when parsing PRT files. This could lead to pointer dereferences of a value obtained from an untrusted source. An attacker could leverage this vulnerability to execute code in the context of the current process." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-822", "description": "UNTRUSTED POINTER DEREFERENCE CWE-822", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-05-27T15:27:23", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-565/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-119468.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-145-01" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2021-27496", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Datakit Software libraries embedded in Luxion KeyShot software", "version": { "version_data": [ { "version_value": "CatiaV5_3dRead, CatiaV6_3dRead, Step3dRead, Ug3dReadPsr, Jt3dReadPsr modules in KeyShot Versions v10.1 and prior" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Datakit Software libraries CatiaV5_3dRead, CatiaV6_3dRead, Step3dRead, Ug3dReadPsr, Jt3dReadPsr modules in KeyShot Versions v10.1 and prior lack proper validation of user-supplied data when parsing PRT files. This could lead to pointer dereferences of a value obtained from an untrusted source. An attacker could leverage this vulnerability to execute code in the context of the current process." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "UNTRUSTED POINTER DEREFERENCE CWE-822" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-565/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-565/" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-119468.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-119468.pdf" }, { "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-145-01", "refsource": "MISC", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-145-01" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2021-27496", "datePublished": "2021-05-27T15:27:05", "dateReserved": "2021-02-19T00:00:00", "dateUpdated": "2024-08-03T21:26:08.972Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-11577
Vulnerability from cvelistv5
Published
2024-11-22 20:43
Modified
2024-11-22 20:43
Severity ?
EPSS score ?
Summary
Luxion KeyShot SKP File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
References
{ "containers": { "cna": { "affected": [ { "defaultStatus": "unknown", "product": "KeyShot", "vendor": "Luxion", "versions": [ { "status": "affected", "version": "2024 13.0.0 Build 92 4.10.171" } ] } ], "dateAssigned": "2024-11-20T16:00:46.052-06:00", "datePublic": "2024-11-21T15:24:30.682-06:00", "descriptions": [ { "lang": "en", "value": "Luxion KeyShot SKP File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Luxion KeyShot. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of SKP files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-23685." } ], "metrics": [ { "cvssV3_0": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787: Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-22T20:43:46.911Z", "orgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "shortName": "zdi" }, "references": [ { "name": "ZDI-24-1608", "tags": [ "x_research-advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1608/" }, { "name": "vendor-provided URL", "tags": [ "vendor-advisory" ], "url": "https://download.keyshot.com/cert/ksa-655925/ksa-655925.pdf?version=1.0\u0026_gl=1*1vzfrlf*_gcl_au*MTIxNTA2Njg4MS4xNzMxNTMwMjIx" } ], "source": { "lang": "en", "value": "Anonymous" }, "title": "Luxion KeyShot SKP File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability" } }, "cveMetadata": { "assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "assignerShortName": "zdi", "cveId": "CVE-2024-11577", "datePublished": "2024-11-22T20:43:46.911Z", "dateReserved": "2024-11-20T22:00:45.994Z", "dateUpdated": "2024-11-22T20:43:46.911Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22645
Vulnerability from cvelistv5
Published
2021-02-23 03:02
Modified
2024-08-03 18:44
Severity ?
EPSS score ?
Summary
Luxion KeyShot versions prior to 10.1, Luxion KeyShot Viewer versions prior to 10.1, Luxion KeyShot Network Rendering versions prior to 10.1, and Luxion KeyVR versions prior to 10.1 are vulnerable to an attack because the .bip documents display a “load” command, which can be pointed to a .dll from a remote network share. As a result, the .dll entry point can be executed without sufficient UI warning.
References
▼ | URL | Tags |
---|---|---|
https://us-cert.cisa.gov/ics/advisories/icsa-21-035-01 | x_refsource_MISC | |
https://cert-portal.siemens.com/productcert/pdf/ssa-231216.pdf | x_refsource_CONFIRM | |
https://www.zerodayinitiative.com/advisories/ZDI-21-323/ | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.754Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-035-01" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-231216.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-323/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Luxion KeyShot", "vendor": "n/a", "versions": [ { "status": "affected", "version": "versions prior to 10.1" } ] }, { "product": "Luxion KeyShot Viewer", "vendor": "n/a", "versions": [ { "status": "affected", "version": "versions prior to 10.1" } ] }, { "product": "Luxion KeyShot Network Rendering", "vendor": "n/a", "versions": [ { "status": "affected", "version": "versions prior to 10.1" } ] }, { "product": "Luxion KeyVR", "vendor": "n/a", "versions": [ { "status": "affected", "version": "versions prior to 10.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Luxion KeyShot versions prior to 10.1, Luxion KeyShot Viewer versions prior to 10.1, Luxion KeyShot Network Rendering versions prior to 10.1, and Luxion KeyVR versions prior to 10.1 are vulnerable to an attack because the .bip documents display a \u201cload\u201d command, which can be pointed to a .dll from a remote network share. As a result, the .dll entry point can be executed without sufficient UI warning." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-357", "description": "INSUFFICIENT UI WARNING OF DANGEROUS OPERATIONS CWE-357", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-03-16T23:07:05", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-035-01" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-231216.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-323/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2021-22645", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Luxion KeyShot", "version": { "version_data": [ { "version_value": "versions prior to 10.1" } ] } }, { "product_name": "Luxion KeyShot Viewer", "version": { "version_data": [ { "version_value": "versions prior to 10.1" } ] } }, { "product_name": "Luxion KeyShot Network Rendering", "version": { "version_data": [ { "version_value": "versions prior to 10.1" } ] } }, { "product_name": "Luxion KeyVR", "version": { "version_data": [ { "version_value": "versions prior to 10.1" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Luxion KeyShot versions prior to 10.1, Luxion KeyShot Viewer versions prior to 10.1, Luxion KeyShot Network Rendering versions prior to 10.1, and Luxion KeyVR versions prior to 10.1 are vulnerable to an attack because the .bip documents display a \u201cload\u201d command, which can be pointed to a .dll from a remote network share. As a result, the .dll entry point can be executed without sufficient UI warning." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "INSUFFICIENT UI WARNING OF DANGEROUS OPERATIONS CWE-357" } ] } ] }, "references": { "reference_data": [ { "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-035-01", "refsource": "MISC", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-035-01" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-231216.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-231216.pdf" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-323/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-323/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2021-22645", "datePublished": "2021-02-23T03:02:08", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.754Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-5507
Vulnerability from cvelistv5
Published
2024-06-06 17:51
Modified
2024-08-01 21:18
Severity ?
EPSS score ?
Summary
Luxion KeyShot Viewer KSP File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://www.zerodayinitiative.com/advisories/ZDI-24-541/ | x_research-advisory | |
https://www.keyshot.com/csirt/ | vendor-advisory |
Impacted products
▼ | Vendor | Product |
---|---|---|
Luxion | KeyShot Viewer |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:luxion:keyshot_viewer:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "keyshot_viewer", "vendor": "luxion", "versions": [ { "lessThan": "2024.1", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-5507", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-05T20:14:01.093561Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-05T20:16:52.183Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T21:18:05.321Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ZDI-24-541", "tags": [ "x_research-advisory", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-541/" }, { "name": "vendor-provided URL", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.keyshot.com/csirt/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "KeyShot Viewer", "vendor": "Luxion", "versions": [ { "status": "affected", "version": "2023.3_12.2.1.2" } ] } ], "dateAssigned": "2024-05-29T16:48:44.884-05:00", "datePublic": "2024-05-31T11:35:07.555-05:00", "descriptions": [ { "lang": "en", "value": "Luxion KeyShot Viewer KSP File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Luxion KeyShot Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of KSP files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22266." } ], "metrics": [ { "cvssV3_0": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-121", "description": "CWE-121: Stack-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-06T17:51:43.852Z", "orgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "shortName": "zdi" }, "references": [ { "name": "ZDI-24-541", "tags": [ "x_research-advisory" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-541/" }, { "name": "vendor-provided URL", "tags": [ "vendor-advisory" ], "url": "https://www.keyshot.com/csirt/" } ], "source": { "lang": "en", "value": "Simon Janz (@esj4y)" }, "title": "Luxion KeyShot Viewer KSP File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability" } }, "cveMetadata": { "assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e", "assignerShortName": "zdi", "cveId": "CVE-2024-5507", "datePublished": "2024-06-06T17:51:43.852Z", "dateReserved": "2024-05-29T21:48:44.855Z", "dateUpdated": "2024-08-01T21:18:05.321Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }