Microsoft 3D Viewer Base3D Code Execution (October 2020)

high Nessus Plugin ID 141430

Synopsis

The Windows app installed on the remote host is affected by a code execution vulnerability.

Description

The Microsoft 3D Viewer app installed on the remote host is affected by a code execution vulnerability when the Base3D rendering engine improperly handles memory. An attacker who successfully exploited the vulnerability would gain execution on a victim system.

Solution

Upgrade to app version 7.2009.29132.0 or later via the Microsoft Store.

See Also

http://www.nessus.org/u?4a0fa39f

http://www.nessus.org/u?baf22b1a

https://www.zerodayinitiative.com/advisories/ZDI-20-1246/

Plugin Details

Severity: High

ID: 141430

File Name: smb_nt_ms20_oct_3d_viewer.nasl

Version: 1.6

Type: local

Agent: windows

Family: Windows

Published: 10/13/2020

Updated: 2/15/2024

Supported Sensors: Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2020-17003

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.8

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: SMB/Registry/Enumerated, installed_sw/Microsoft.Microsoft3DViewer

Exploit Ease: No known exploits are available

Patch Publication Date: 10/13/2020

Vulnerability Publication Date: 10/13/2020

Reference Information

CVE: CVE-2020-16918, CVE-2020-17003