22 results (0.006 seconds)

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 1

An exploitable vulnerability exists in the way Pixar OpenUSD 20.05 handles file offsets in binary USD files. A specially crafted malformed file can trigger an arbitrary out-of-bounds memory access that could lead to the disclosure of sensitive information. This vulnerability could be used to bypass mitigations and aid additional exploitation. To trigger this vulnerability, the victim needs to access an attacker-provided file. Se presenta una vulnerabilidad explotable en la forma en que Pixar OpenUSD versión 20.05 maneja las compensaciones de archivos en los archivos binarios USD. • https://talosintelligence.com/vulnerability_reports/TALOS-2020-1104 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-787: Out-of-bounds Write •

CVSS: 9.8EPSS: 1%CPEs: 1EXPL: 0

The Pixar ruby-jss gem before 1.6.0 allows remote attackers to execute arbitrary code because of the Plist gem's documented behavior of using Marshal.load during XML document processing. La gema Pixar ruby-jss antes de la versión 1.6.0 permite a los atacantes remotos ejecutar código arbitrario debido al comportamiento documentado de la gema Plist de utilizar Marshal.load durante el procesamiento de documentos XML • https://github.com/PixarAnimationStudios/ruby-jss/blob/e6d48dd8c77f9275c76787d60d3472615fcd9b77/CHANGES.md#160---2021-05-24 https://github.com/patsplat/plist/tree/ce8f9ae42a114f603ea200c955e420782bffc4ad#label-Security+considerations •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

A use-after-free vulnerability exists in a way Pixar OpenUSD 20.08 processes reference paths textual USD files. A specially crafted file can trigger the reuse of a freed memory which can result in further memory corruption and arbitrary code execution. To trigger this vulnerability, the victim needs to open an attacker-provided malformed file. Se presenta una vulnerabilidad de uso de la memoria previamente liberada en la manera en que Pixar OpenUSD versión 20.08, procesa rutas de referencia de archivos USD textuales. Un archivo especialmente diseñado puede desencadenar la reutilización de una memoria liberada, lo que puede resultar en una mayor corrupción de la memoria y una ejecución de código arbitraria. • https://talosintelligence.com/vulnerability_reports/TALOS-2020-1145 • CWE-416: Use After Free •

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 1

An exploitable vulnerability exists in the way Pixar OpenUSD 20.05 handles parses certain encoded types. A specially crafted malformed file can trigger an arbitrary out of bounds memory access which could lead to information disclosure. This vulnerability could be used to bypass mitigations and aid further exploitation. To trigger this vulnerability, the victim needs to access an attacker-provided malformed file. Existe una vulnerabilidad explotable en la forma en que Pixar OpenUSD 20.05 maneja el análisis de ciertos tipos codificados. • https://talosintelligence.com/vulnerability_reports/TALOS-2020-1105 • CWE-125: Out-of-bounds Read •

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 1

An exploitable vulnerability exists in the way Pixar OpenUSD 20.05 handles parses certain encoded types. A specially crafted malformed file can trigger an arbitrary out of bounds memory access in String Type Index. This vulnerability could be used to bypass mitigations and aid further exploitation. To trigger this vulnerability, the victim needs to access an attacker-provided malformed file. Se presenta una vulnerabilidad explotable en la manera en que Pixar OpenUSD versión 20.05, maneja determinados tipos codificados. • https://talosintelligence.com/vulnerability_reports/TALOS-2020-1105 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-125: Out-of-bounds Read •