'; } else{ echo ''; } echo '
|
|
|||
| Rule General Information |
|---|
| Release Date: | 2021-01-21 | |
| Rule Name: | Trimble Navigation SketchUp PICT File Buffer Overflow Vulnerability (CVE-2013-3664) | |
| Severity: | ||
| CVE ID: | ||
| Rule Protection Details |
|---|
| Description: | A remote code execution vulnerability exists in Trimble SketchUp. The vulnerability is due to a stack buffer overflow while processing PICT files which contain a malicious number of ARGB entries. Remote unauthenticated attackers can exploit this vulnerability by enticing a target user to open a malicious PICT file. Successful exploitation could result in arbitrary code execution with the privileges of the logged in user. If exploitation is not successful, the application may abnormally terminate. | |
| Impact: | A buffer overflow vulnerability can be triggered by an attacker in the context of the vulnerable product. Further attacks includes arbitrary code execution and denial of service. | |
| Affected OS: | Windows, Linux, Others | |
| Reference: | SecurityFocusBID:60248 http://archives.neohapsis.com/archives/bugtraq/2013-06/0008.html http://blog.binamuse.com/2013/05/multiple-vulnerabilities-on-sketchup.html http://www.binamuse.com/advisories/BINA-20130521A.txt |
|
| Solutions |
|---|
| The vendors have released upgrade patches to fix vulnerabilities, please visit: http://www.sketchup.com/products/sketchup-pro/new-in-2013 |