First published: Tue Mar 09 2021(Updated: )
This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP 3D Visual Enterprise Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of HPGL files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP 3D Visual Enterprise Viewer | ||
SAP 3D Visual Enterprise Viewer | =9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-27588 has a critical severity level as it allows remote code execution on vulnerable SAP installations.
To fix CVE-2021-27588, ensure that you install the latest security patches provided by SAP for 3D Visual Enterprise Viewer.
CVE-2021-27588 affects users of SAP 3D Visual Enterprise Viewer version 9.
Exploitation of CVE-2021-27588 requires user interaction, as the target must visit a malicious page or open a malicious file.
CVE-2021-27588 can be exploited to execute arbitrary code on affected installations, leading to potential system compromise.