Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-cjxf-q67x-5fcw

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Datakit Software libraries CatiaV5_3dRead, CatiaV6_3dRead, Step3dRead, Ug3dReadPsr, Jt3dReadPsr modules in KeyShot Versions v10.1 and prior lack proper validation of user-supplied data when parsing CATPart files. This could result in an out-of-bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process.

Datakit Software libraries CatiaV5_3dRead, CatiaV6_3dRead, Step3dRead, Ug3dReadPsr, Jt3dReadPsr modules in KeyShot Versions v10.1 and prior lack proper validation of user-supplied data when parsing CATPart files. This could result in an out-of-bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process.

EPSS

Процентиль: 53%
0.00297
Низкий

Дефекты

CWE-787

Связанные уязвимости

CVSS3: 7.8
nvd
больше 4 лет назад

Datakit Software libraries CatiaV5_3dRead, CatiaV6_3dRead, Step3dRead, Ug3dReadPsr, Jt3dReadPsr modules in KeyShot Versions v10.1 and prior lack proper validation of user-supplied data when parsing CATPart files. This could result in an out-of-bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process.

EPSS

Процентиль: 53%
0.00297
Низкий

Дефекты

CWE-787