CVE-2022-41211

CVSS V2 None CVSS V3 High 7.8
Description
Due to lack of proper memory management, when a victim opens manipulated file received from untrusted sources in SAP 3D Visual Enterprise Author and SAP 3D Visual Enterprise Viewer, Arbitrary Code Execution can be triggered when payload forces:Re-use of dangling pointer which refers to overwritten space in memory. The accessed memory must be filled with code to execute the attack. Therefore, repeated success is unlikely.Stack-based buffer overflow. Since the memory overwritten is random, based on access rights of the memory, repeated success is not assured.
Overview
  • CVE ID
  • CVE-2022-41211
  • Assigner
  • cna@sap.com
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2022-11-08T22:15:18
  • Last Modified Date
  • 2022-12-08T22:49:30
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:sap:3d_visual_enterprise_author:9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:sap:3d_visual_enterprise_viewer:9:*:*:*:*:*:*:* 1 OR
CVSS Version 3
  • Version
  • 3.1
  • Vector String
  • CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • Attack Vector
  • LOCAL
  • Attack Compatibility
  • LOW
  • Privileges Required
  • NONE
  • User Interaction
  • REQUIRED
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • HIGH
  • Availability Impact
  • HIGH
  • Base Score
  • 7.8
  • Base Severity
  • HIGH
  • Exploitability Score
  • 1.8
  • Impact Score
  • 5.9
History
Created Old Value New Value Data Type Notes
2022-11-08 23:00:20 Added to TrackCVE
2022-12-07 17:30:02 2022-11-08T22:15Z 2022-11-08T22:15:18 CVE Published Date updated
2022-12-07 17:30:02 2022-11-10T06:15:12 CVE Modified Date updated
2022-12-07 17:30:02 Undergoing Analysis Vulnerability Status updated
2022-12-07 17:30:04 CPE Information updated
2022-12-08 23:16:11 2022-12-08T22:49:30 CVE Modified Date updated
2022-12-08 23:16:11 Undergoing Analysis Analyzed Vulnerability Status updated