{"id": "VULNERLAB:99", "vendorId": null, "type": "vulnerlab", "bulletinFamily": "exploit", "title": "Google SketchUp v8.x - Memory Corruption Vulnerability", "description": "", "published": "2011-09-12T00:00:00", "modified": "2011-09-12T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "cvss2": {}, "cvss3": {}, "href": "http://www.vulnerability-lab.com/get_content.php?id=99", "reporter": "Vulnerability Research Laboratory - Benjamin Kunz Mejri (Rem0ve)", "references": [], "cvelist": [], "immutableFields": [], "lastseen": "2018-03-01T19:13:57", "viewCount": 6, "enchantments": {"score": {"value": 0.8, "vector": "NONE"}, "dependencies": {}, "backreferences": {"references": [{"type": "threatpost", "idList": ["THREATPOST:07A8466539FBE60F0745BA8985EE73D1", "THREATPOST:87674040C7E713171787C372FB0D24DB", "THREATPOST:A5DA2027FC2C5FE68AC50C92BE182FB8", "THREATPOST:E6F05C49DD277EEC47DDEFB35F8D2818"]}]}, "exploitation": null, "vulnersScore": 0.8}, "sourceData": "Document Title:\r\n===============\r\nGoogle SketchUp v8.x - Memory Corruption Vulnerability\r\n\r\n\r\n\r\nRelease Date:\r\n=============\r\n2011-09-12\r\n\r\n\r\nVulnerability Laboratory ID (VL-ID):\r\n====================================\r\n99\r\n\r\n\r\nProduct & Service Introduction:\r\n===============================\r\nGoogle SketchUp Pro is 3D modeling software for professionals. SketchUp is easy and intuitive, allowing anyone to model \r\nin 3D quickly and accurately. Using 3D models, designers can make more informed decisions, communicate project details, \r\nand share ideas with colleagues and customers to reach a common goal. SketchUp Pro includes LayOut, a 2D documentation \r\nand presentation tool for professionals. LayOut combines 3D models with text and 2D drawing elements to create design \r\ndocuments, construction drawings and compelling digital presentations.\r\n\r\n(Copy of the Vendor Homepage: http://sketchup.google.com/intl/de/download/)\r\n\r\n\r\nAbstract Advisory Information:\r\n==============================\r\nVulnerability-Lab Team discovered a Memory Corruption Vulnerability on Googles SketchUp Software v8.x.\r\n\r\n\r\nVulnerability Disclosure Timeline:\r\n==================================\r\n2011-09-13:\tPublic or Non-Public Disclosure\r\n\r\n\r\nDiscovery Status:\r\n=================\r\nPublished\r\n\r\n\r\nAffected Product(s):\r\n====================\r\n\r\nExploitation Technique:\r\n=======================\r\nLocal\r\n\r\n\r\nSeverity Level:\r\n===============\r\nMedium\r\n\r\n\r\nTechnical Details & Description:\r\n================================\r\nA Memory Corruption vulnerability is detected on the Google s SketchUp v8.x. The vulnerability is caused by an memory corruption when \r\nprocessing corrupt DAE files through the filter, which could be exploited by attackers to crash an affected/vulnerable application. \r\nIts also possible to execute maschine specific code by tricking a user into opening a special crafted (manipulated) DAE file. The bug \r\nis located in the configuration & transformation handling of .dae import function (module).\r\n\r\nVulnerable Module(s): \r\n\t\t\t [+] DAE - Import\r\n\r\n\r\n--- Bugsplat Logs ---\r\n2011-07-24 20:20:55 Entered Unhandled Exception Filter\r\n2011-07-24 20:20:55 Minidump file successfully saved C:/Users/Rem0ve/AppData/Local/Temp/SketchUp4EKL42V3.dmp\r\n2011-07-24 20:20:55 Launching BsSndRpt.exe /BsSndRpt.exe/ /i /C:/Users/Rem0ve/AppData/Local/Temp/BsSndRpt.ini/ \r\n2011-07-24 20:26:00 Entered Unhandled Exception Filter\r\n2011-07-24 20:26:01 Minidump file successfully saved C:/Users/Rem0ve/AppData/Local/Temp/SketchUpUHV15AH1.dmp\r\n2011-07-24 20:26:01 Launching BsSndRpt.exe /BsSndRpt.exe/ /i /C:/Users/Rem0ve/AppData/Local/Temp/BsSndRpt.ini/ \r\n2011-07-24 20:26:53 Entered Unhandled Exception Filter\r\n2011-07-24 20:26:54 Minidump file successfully saved C:/Users/Rem0ve/AppData/Local/Temp/SketchUpGRD510S5.dmp\r\n2011-07-24 20:26:54 Launching BsSndRpt.exe /BsSndRpt.exe/ /i /C:/Users/Rem0ve/AppData/Local/Temp/BsSndRpt.ini/ \r\n2011-07-24 20:35:51 Entered Unhandled Exception Filter\r\n2011-07-24 20:35:51 Minidump file successfully saved C:/Users/Rem0ve/AppData/Local/Temp/SketchUp4H214T15.dmp\r\n2011-07-24 20:35:51 Launching BsSndRpt.exe /BsSndRpt.exe/ /i /C:/Users/Rem0ve/AppData/Local/Temp/BsSndRpt.ini/ \r\n\r\n\r\n--- Sketchup Logs ---\r\nCommit(0)\r\nCommit(0)\r\nCommit(0)\r\nCommit(0)\r\nCommit(0)\r\nCommit(0)\r\nCommit(0)\r\nCommit(0)\r\nCommit(0)\r\nCommit(0)\r\nCommit(0)\r\nCommit(0)\r\nCommit(0)\r\nCommit(0)\r\nCommit(0)\r\nCommit(0)\r\nCommit(0)\r\nCommit(0)\r\nCommit(0)\r\nCommit(0)\r\nCommit(0)\r\nCommit(0)\r\nCommit(0)\r\nCommit(0)\r\nCommit(0)\r\nCommit(0)\r\nCommit(0)\r\nCommit(0)\r\nCommit(0)\r\nCommit(0)\r\nCommit(0)\r\nCommit(0)\r\nCommit(0)\r\nCommit(0)\r\nCommit(0)\r\nCommit(0)\r\nCommit(0)\r\nCommit(0)\r\nCommit(0)\r\n\r\n--- Exception Logs ---\r\n(10f4.dcc): C++ EH exception - code e06d7363 (first chance)\r\neax=0986ef50 ebx=08b05001 ecx=00000003 edx=00000000 esi=08cbf53c edi=090433d8\r\neip=75feb727 esp=0986ef50 ebp=0986efa0 iopl=0 nv up ei pl nz ac pe nc\r\ncs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00000216\r\nKERNELBASE!RaiseException+0x58:\r\n75feb727 c9 \r\n0:001> gn\r\n(10f4.dcc): C++ EH exception - code e06d7363 (first chance)\r\neax=0986edfc ebx=08afce20 ecx=00000003 edx=00000000 esi=0986f4c0 edi=08f4b4b0\r\neip=75feb727 esp=0986edfc ebp=0986ee4c iopl=0 nv up ei pl nz na pe nc\r\ncs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00000206\r\nKERNELBASE!RaiseException+0x58:\r\n75feb727 c9 \r\n0:001> gn\r\n(10f4.dcc): C++ EH exception - code e06d7363 (first chance)\r\neax=0986edfc ebx=08afce20 ecx=00000003 edx=00000000 esi=0986f4c0 edi=08f90bd0\r\neip=75feb727 esp=0986edfc ebp=0986ee4c iopl=0 nv up ei pl nz na pe nc\r\ncs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00000206\r\nKERNELBASE!RaiseException+0x58:\r\n75feb727 c9 \r\n0:001> g\r\neax=00000000 ebx=77a21c04 ecx=00000000 edx=00000000 esi=004da500 edi=00000000\r\neip=779e00ed esp=0672fc8c ebp=0672fe20 iopl=0 nv up ei pl nz na po nc\r\ncs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00000202\r\nntdll!NtWaitForMultipleObjects+0x15:\r\n779e00ed 83c404 add esp,4\r\n\r\n\r\nInformation:\r\nThe sketchup exception-handling filters wrong or manipulated file imports & mark them as not working(wrong.png).\r\nThe PoC is not affected by the sketchup exception-handling & get through without any blocking exception-handling. \r\n\r\n\r\nPictures:\r\n\t\t\t../1.png\r\n\t\t\t../2.png\r\n\t\t\t../2.2-bex.png\r\n\t\t\t../3.png\r\n\t\t\t../wrong.png\r\n\r\nAnalyses:\r\n\t\t\t../AppCrash_SketchUp.exe_b7af0d96025b256cb43f14bb2184042bfdb54f4_114ea662\r\n\t\t\t../AppCrash_SketchUp.exe_b23e85cdd9cd939dfa22fccaf81865a57c03cb_12666c3f\r\n\t\t\t../Crash Reports\r\n\t\t\t../SketchUp5FMH3QI7.dmp\r\n\t\t\t../SketchUpCTOP41M5.dmp\r\n\t\t\t../bugsplat.log\r\n\r\n\r\nProof of Concept (PoC):\r\n=======================\r\nThe vulnerability can be exploited by local attackers or remote attackers via high required user inter action.\r\nFor demonstration or reproduce ...\r\n\r\n\r\n</mesh>\r\n</geometry>\r\n<geometry id=\"ID98\">\r\n<mesh>\r\n<source id=\"ID101\">\r\n<float_array id=\"ID103\" count=\"18\">9.012466 -7.460699e-014 32.20518 8.953292 -6.750156e-014 32.1395 9.053064 -4.973799e-014 \r\n32.37933 8.872076 -6.394885e-014 32.69951 8.781835 -4.263256e-014 33.29565 8.601355 -2.131628e-014 34.02728</float_array>\r\n <technique_common>\r\n <accessor count=\"6\" source=\"#ID103\" stride=\"3\">\r\n <param name=\"X\" type=\"float\" />\r\n <param name=\"Y\" type=\"float\" />\r\n <param name=\"CORRUPT\" type=\"float\" />\r\n\t </accessor>\r\n </technique_common>\r\n\r\n\r\nPoC:\t\t\t../PoC/poc.dae\r\nSIZE:\t\t\t136kb\r\n\r\n\r\nSecurity Risk:\r\n==============\r\nThe security risk of the memory corruption vulnerability is estimated as medium.\r\n\r\n\r\nCredits & Authors:\r\n==================\r\nVulnerability Research Laboratory - Benjamin Kunz Mejri (Rem0ve)\r\n\r\n\r\nDisclaimer & Information:\r\n=========================\r\nThe information provided in this advisory is provided as it is without any warranty. Vulnerability-Lab disclaims all warranties, \r\neither expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-\r\nLab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business \r\nprofits or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some \r\nstates do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation \r\nmay not apply. We do not approve or encourage anybody to break any vendor licenses, policies, deface websites, hack into databases \r\nor trade with fraud/stolen material.\r\n\r\nDomains: www.vulnerability-lab.com \t- www.vuln-lab.com\t\t\t - www.vulnerability-lab.com/register\r\nContact: admin@vulnerability-lab.com \t- support@vulnerability-lab.com \t - research@vulnerability-lab.com\r\nSection: video.vulnerability-lab.com \t- forum.vulnerability-lab.com \t\t - news.vulnerability-lab.com\r\nSocial:\t twitter.com/#!/vuln_lab \t\t- facebook.com/VulnerabilityLab \t - youtube.com/user/vulnerability0lab\r\nFeeds:\t vulnerability-lab.com/rss/rss.php\t- vulnerability-lab.com/rss/rss_upcoming.php - vulnerability-lab.com/rss/rss_news.php\r\n\r\nAny modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory. \r\nPermission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other \r\nmedia, are reserved by Vulnerability-Lab Research Team or its suppliers. All pictures, texts, advisories, sourcecode, videos and \r\nother information on this website is trademark of vulnerability-lab team & the specific authors or managers. To record, list (feed), \r\nmodify, use or edit our material contact (admin@vulnerability-lab.com or support@vulnerability-lab.com) to get a permission.\r\n\r\n \t\t\t\t \tCopyright \u00a9 2012 | Vulnerability Laboratory\r\n\r\n\r\n\r\n", "category": "", "_state": {"dependencies": 1645548369}}