Lucene search

K
cve[email protected]CVE-2022-41185
HistoryOct 11, 2022 - 9:15 p.m.

CVE-2022-41185

2022-10-1121:15:20
CWE-787
CWE-119
web.nvd.nist.gov
22
6
cve-2022-41185
memory management
sap 3d visual enterprise author
remote code execution
security vulnerability

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

51.4%

Due to lack of proper memory management, when a victim opens a manipulated Visual Design Stream (.vds, MataiPersistence.dll) file received from untrusted sources in SAP 3D Visual Enterprise Author - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of dangling pointer which refers to overwritten space in memory.

Affected configurations

NVD
Node
sap3d_visual_enterprise_authorMatch9.0

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "SAP 3D Visual Enterprise Author",
    "vendor": "SAP SE",
    "versions": [
      {
        "status": "affected",
        "version": "9"
      }
    ]
  }
]

Social References

More

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

51.4%

Related for CVE-2022-41185