This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of SAP 3D Visual Enterprise Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the handling of JPEG2000 files. The issue lies in the failure to ensure that index values are within the bounds of an allocated array. An attacker can leverage this vulnerability to execute arbitrary code within the context of the current process.