CVE-2013-3664

Google Sketchup < 8.0 - Memory Corruption

Title source: rule
STIX 2.1

Description

Trimble SketchUp (formerly Google SketchUp) before 2013 (13.0.3689) allows remote attackers to execute arbitrary code via a crafted color palette table in a MAC Pict texture, which triggers an out-of-bounds stack write. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-3662. NOTE: this issue was SPLIT due to different affected products and codebases (ADT1); CVE-2013-7388 has been assigned to the paintlib issue.

Exploits (2)

nomisec WORKING POC
by defrancescojp · poc
https://github.com/defrancescojp/CVE-2013-3664_MAC
nomisec WORKING POC
by defrancescojp · poc
https://github.com/defrancescojp/CVE-2013-3664_BMP

References (6)

Core 6
Core References
Exploit mailing-list x_refsource_bugtraq
http://archives.neohapsis.com/archives/bugtraq/2013-06/0008.html
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/84723
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/60248
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/53635

Scores

EPSS 0.1663
EPSS Percentile 95.0%

Details

CWE
CWE-119
Status published
Products (5)
google/sketchup 6.0 maintenance_6
google/sketchup 7.0 maintenance_1
google/sketchup 7.1 (3 CPE variants)
google/sketchup 8.0 (5 CPE variants)
trimble/sketchup < 8.0
Published Jul 01, 2014
Tracked Since Feb 18, 2026