Heap-based buffer overflow in the browser plugin for PTC Creo View allows remote attackers to execute arbitrary code via vectors involving setting a large buffer to an unspecified attribute.
Desbordamiento de buffer basado en memoria dinámica en el plugin browser para PTC Creo View permite a atacantes remotos ejecutar código arbitrario a través de vectores que involucran configurar un buffer grande a un atributo no especificado.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of PTC Creo View. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the Creo View browser plugin. An attacker can trigger a heap overflow, by setting a large buffer to a specific attribute. This would allow an attacker to execute arbitrary code in the context of the browser.