Luxion KeyShot versions prior to 10.1, Luxion KeyShot Viewer versions prior to 10.1, Luxion KeyShot Network Rendering versions prior to 10.1, and Luxion KeyVR versions prior to 10.1 have multiple NULL pointer dereference issues while processing project files, which may allow an attacker to execute arbitrary code.
The product obtains a value from an untrusted source, converts this value to a pointer, and dereferences the resulting pointer.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Keyshot | Luxion | * | 10.1 (excluding) |
Keyshot_network_rendering | Luxion | * | 10.1 (excluding) |
Keyshot_viewer | Luxion | * | 10.1 (excluding) |
Keyvr | Luxion | * | 10.1 (excluding) |
An attacker can supply a pointer for memory locations that the product is not expecting. If the pointer is dereferenced for a write operation, the attack might allow modification of critical state variables, cause a crash, or execute code. If the dereferencing operation is for a read, then the attack might allow reading of sensitive data, cause a crash, or set a variable to an unexpected value (since the value will be read from an unexpected memory location). There are several variants of this weakness, including but not necessarily limited to: