A heap overflow vulnerability exists in Pixar OpenUSD 20.05 when the software parses compressed sections in binary USD files. A specially crafted USDC file format path jumps decompression heap overflow in a way path jumps are processed. To trigger this vulnerability, the victim needs to open an attacker-provided malformed file.
References
Link | Resource |
---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1094 | Exploit Technical Description Third Party Advisory |
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1094 | Exploit Technical Description Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 05:01
Type | Values Removed | Values Added |
---|---|---|
References | () https://talosintelligence.com/vulnerability_reports/TALOS-2020-1094 - Exploit, Technical Description, Third Party Advisory |
Information
Published : 2020-12-02 18:15
Updated : 2024-11-21 05:01
NVD link : CVE-2020-13493
Mitre link : CVE-2020-13493
CVE.ORG link : CVE-2020-13493
JSON object : View
Products Affected
pixar
- openusd
apple
- macos