![]() ![]() This file chunk contains the name of the resource along with the number of bytes contained in this resource. To begin processing a given resource file, a 520 byte chunk is read from the file. The BIMx file format is composed of a variety of resource files which are read and written to disk before The modules used in this vulnerability are below: 00007ff77c5f0000 00007ff77c818000 BIMx (deferred) With Desktop Viewer, clients can view their prospective models without the need of having to install the entire suite of tools needed to create the model itself. Graphisoft BIMx Desktop Viewer 20 PRODUCT URLSĨ.8 - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CWEĬWE-680 - Integer Overflow to Buffer Overflow DETAILSīIMx Desktop Viewer allows for models created by Graphisoft ArchiCad to be shared and viewed by anyone. The versions below were either tested or verified to be vulnerable by Talos or confirmed to be vulnerable by the vendor. Open any 2D layout you have in your BIMx Hyper-model, in the top right corner of your screen you will find the below icon. An attacker can provide a malicious file to trigger this vulnerability. A specially crafted file can cause a heap buffer overflow resulting in a code execution. An exploitable code execution vulnerability exists in the file format parsing functionality of Graphisoft BIMx Desktop Viewer 20.
0 Comments
Leave a Reply. |