SB2023011049 - Multiple vulnerabilities in Microsoft 3D Builder
Published: January 10, 2023 Updated: April 3, 2023
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 14 secuirty vulnerabilities.
1) Input validation error (CVE-ID: CVE-2023-21792)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in the 3D Builder. A remote attacker can trick a victim to open a specially crafted file and execute arbitrary code on the target system.
2) Input validation error (CVE-ID: CVE-2023-21780)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in the 3D Builder. A remote attacker can trick a victim to open a specially crafted file and execute arbitrary code on the target system.
3) Input validation error (CVE-ID: CVE-2023-21781)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in the 3D Builder. A remote attacker can trick a victim to open a specially crafted file and execute arbitrary code on the target system.
4) Input validation error (CVE-ID: CVE-2023-21782)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in the 3D Builder. A remote attacker can trick a victim to open a specially crafted file and execute arbitrary code on the target system.
5) Input validation error (CVE-ID: CVE-2023-21784)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in the 3D Builder. A remote attacker can trick a victim to open a specially crafted file and execute arbitrary code on the target system.
6) Input validation error (CVE-ID: CVE-2023-21786)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in the 3D Builder. A remote attacker can trick a victim to open a specially crafted file and execute arbitrary code on the target system.
7) Input validation error (CVE-ID: CVE-2023-21791)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in the 3D Builder. A remote attacker can trick a victim to open a specially crafted file and execute arbitrary code on the target system.
8) Input validation error (CVE-ID: CVE-2023-21793)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in the 3D Builder. A remote attacker can trick a victim to open a specially crafted file and execute arbitrary code on the target system.
9) Input validation error (CVE-ID: CVE-2023-21783)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in the 3D Builder. A remote attacker can trick a victim to open a specially crafted file and execute arbitrary code on the target system.
10) Input validation error (CVE-ID: CVE-2023-21785)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in the 3D Builder. A remote attacker can trick a victim to open a specially crafted file and execute arbitrary code on the target system.
11) Input validation error (CVE-ID: CVE-2023-21787)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in the 3D Builder. A remote attacker can trick a victim to open a specially crafted file and execute arbitrary code on the target system.
12) Input validation error (CVE-ID: CVE-2023-21788)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in the 3D Builder. A remote attacker can trick a victim to open a specially crafted file and execute arbitrary code on the target system.
13) Input validation error (CVE-ID: CVE-2023-21789)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in the 3D Builder. A remote attacker can trick a victim to open a specially crafted file and execute arbitrary code on the target system.
14) Input validation error (CVE-ID: CVE-2023-21790)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in the 3D Builder. A remote attacker can trick a victim to open a specially crafted file and execute arbitrary code on the target system.
Remediation
Install update from vendor's website.
References
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-21792
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-21780
- https://www.zerodayinitiative.com/advisories/ZDI-23-365/
- https://www.zerodayinitiative.com/advisories/ZDI-23-371/
- https://www.zerodayinitiative.com/advisories/ZDI-23-372/
- https://www.zerodayinitiative.com/advisories/ZDI-23-373/
- https://www.zerodayinitiative.com/advisories/ZDI-23-374/
- https://www.zerodayinitiative.com/advisories/ZDI-23-375/
- https://www.zerodayinitiative.com/advisories/ZDI-23-364/
- https://www.zerodayinitiative.com/advisories/ZDI-23-363/
- https://www.zerodayinitiative.com/advisories/ZDI-23-362/
- https://www.zerodayinitiative.com/advisories/ZDI-23-361/
- https://www.zerodayinitiative.com/advisories/ZDI-23-360/
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-21781
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-21782
- https://www.zerodayinitiative.com/advisories/ZDI-23-366/
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-21784
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-21786
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-21791
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-21793
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-21783
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-21785
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-21787
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-21788
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-21789
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-21790