Arbitrary Code Execution via Memory Management Vulnerabilities in SAP 3D Visual Enterprise Author and Viewer

Arbitrary Code Execution via Memory Management Vulnerabilities in SAP 3D Visual Enterprise Author and Viewer

CVE-2022-41211 · HIGH Severity

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Due to lack of proper memory management, when a victim opens manipulated file received from untrusted sources in SAP 3D Visual Enterprise Author and SAP 3D Visual Enterprise Viewer, Arbitrary Code Execution can be triggered when payload forces:Re-use of dangling pointer which refers to overwritten space in memory. The accessed memory must be filled with code to execute the attack. Therefore, repeated success is unlikely.Stack-based buffer overflow. Since the memory overwritten is random, based on access rights of the memory, repeated success is not assured.

Learn more about our Web Application Penetration Testing UK.