CVE-2022-41179 PUBLISHED

Due to lack of proper memory management, when a victim opens a manipulated Jupiter Tesselation (.jt, JtTranslator.exe) file received from untrusted sources in SAP 3D Visual Enterprise Author - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of dangling pointer which refers to overwritten space in memory.

EPSS 0.19% · 40.7th percentile

Risk Scores

EPSS Score
0.19%
40.7th percentile

Affected Products

VendorProductVersions
sap3d_visual_enterprise_author9.0
SAP SESAP 3D Visual Enterprise Author9

Timeline

References

Open in Interactive Console →