Substance3D - Painter versions 9.1.1 and earlier are affected by a Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
References
Link | Resource |
---|---|
https://helpx.adobe.com/security/products/substance3d_painter/apsb24-04.html | Vendor Advisory |
Configurations
History
16 Feb 2024, 20:08
Type | Values Removed | Values Added |
---|---|---|
References | () https://helpx.adobe.com/security/products/substance3d_painter/apsb24-04.html - Vendor Advisory | |
First Time |
Adobe substance 3d Painter
Adobe |
|
CPE | cpe:2.3:a:adobe:substance_3d_painter:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
15 Feb 2024, 11:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-15 11:15
Updated : 2024-02-28 20:54
NVD link : CVE-2024-20723
Mitre link : CVE-2024-20723
CVE.ORG link : CVE-2024-20723
JSON object : View
Products Affected
adobe
- substance_3d_painter
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')