BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to the Zeroday Tracker: Your Vulnerability Watchlist

Get critical updates on the latest zeroday threats, including impact, mitigation and protection information - only from BeyondTrust.

SketchUp Viewer .SKP Buffer Overflow

Disclosed December 12, 2013    Zeroday : 373 days

Vulnerability Description:

SketchUp Viewer is vulnerable to a buffer overflow that occurs when parsing a malicious .SKP file.

Vendors:

SketchUp

Vulnerable Software/Devices:

SketchUp Viewer version 13.0.4124

Vulnerability Severity:

High

Exploit Availability:

No Exploit Available

Exploit Impact:

Remote Code Execution
Exploitation of this vulnerability is possible by sending maliciously crafted documents, via phishing emails, to vulnerable users. Remote attackers who successfully exploit this vulnerability will be able to execute code on the vulnerable system with the same rights as the currently logged on user.

BeyondTrust Prevention and Detection:

BeyondTrust's Retina® Network Security Scanner scans devices to detect for this vulnerability.

  • 31900 - SketchUp Viewer .SKP Buffer Overflow (Zero-Day)
  • 31901 - SketchUp Viewer .SKP Buffer Overflow (Zero-Day) - x64

Mitigation:

No mitigation is available.

Links:

CVE(s):