CVE-2020-6343 – SAP 3D Visual Enterprise Viewer EPS File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2020-6343
SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated EPS file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation. SAP 3D Visual Enterprise Viewer, versión - 9, permite a un usuario abrir un archivo EPS manipulado recibido desde fuentes no confiables, lo que resulta en un bloqueo de la aplicación y trae una no disponibilidad temporalmente hasta que el usuario reinicie la aplicación, esto es causado debido a una Comprobación Inapropiada de la Entrada. This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of EPS files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. • https://launchpad.support.sap.com/#/notes/2960815 https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=557449700 https://www.zerodayinitiative.com/advisories/ZDI-20-1151 • CWE-787: Out-of-bounds Write •
CVE-2020-6342 – SAP 3D Visual Enterprise Viewer U3D File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2020-6342
SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated U3D file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation. SAP 3D Visual Enterprise Viewer, versión - 9, permite a un usuario abrir un archivo U3D manipulado recibido desde fuentes no confiables, lo que resulta en un bloqueo de la aplicación y trae una no disponibilidad temporalmente hasta que el usuario reinicie la aplicación, esto es causado debido a una Comprobación Inapropiada de la Entrada. This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of U3D files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. • https://launchpad.support.sap.com/#/notes/2960815 https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=557449700 https://www.zerodayinitiative.com/advisories/ZDI-20-1152 • CWE-787: Out-of-bounds Write •
CVE-2020-6339 – SAP 3D Visual Enterprise Viewer BMP File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2020-6339
SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated BMP file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation. SAP 3D Visual Enterprise Viewer, versión - 9, permite a un usuario abrir un archivo BMP manipulado recibido desde fuentes no confiables, lo que resulta en un bloqueo de la aplicación y trae una no disponibilidad temporalmente hasta que el usuario reinicie la aplicación, esto es causado debido a una Comprobación Inapropiada de la Entrada. This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of BMP files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. • https://launchpad.support.sap.com/#/notes/2960815 https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=557449700 https://www.zerodayinitiative.com/advisories/ZDI-20-1156 • CWE-787: Out-of-bounds Write •
CVE-2020-6337 – SAP 3D Visual Enterprise Viewer HDR File Parsing Memory Corruption Remote Code Execution Vulnerabililty
https://notcve.org/view.php?id=CVE-2020-6337
SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated HDR file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation. SAP 3D Visual Enterprise Viewer, versión - 9, permite a un usuario abrir un archivo HDR manipulado recibido desde fuentes no confiables, lo que resulta en un bloqueo de la aplicación y trae una no disponibilidad temporalmente hasta que el usuario reinicie la aplicación, esto es causado debido a una Comprobación Inapropiada de la Entrada. This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of HDR files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. • https://launchpad.support.sap.com/#/notes/2960815 https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=557449700 https://www.zerodayinitiative.com/advisories/ZDI-20-1155 • CWE-787: Out-of-bounds Write •
CVE-2020-6338 – SAP 3D Visual Enterprise Viewer RH File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2020-6338
SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated RH file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation. SAP 3D Visual Enterprise Viewer, versión - 9, permite a un usuario abrir un archivo RH manipulado recibido desde fuentes no confiables, lo que resulta en un bloqueo de la aplicación y trae una no disponibilidad temporalmente hasta que el usuario reinicie la aplicación, esto es causado debido a una Comprobación Inapropiada de la Entrada. This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of RH files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. • https://launchpad.support.sap.com/#/notes/2960815 https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=557449700 https://www.zerodayinitiative.com/advisories/ZDI-20-1157 • CWE-20: Improper Input Validation •