Google SketchUp < 7.1 M2 Remote Code Execution Vulnerabilities

High Nessus Plugin ID 56980


The remote host has a 3-D modeling application that is affected by two remote code execution vulnerabilities.


The version of Google SketchUp installed on the remote host is earlier than 7.1 Maintenance Release 2. Such versions fail to perform adequate checks when processing data contained in '.SKP' and '.3DS' files, therefore allowing memory to become corrupted. An attacker can exploit this issue by providing a specially crafted '.SKP' or '.3DS' file to the victim that can execute arbitrary code in the context of the application.


Upgrade to Google SketchUp 7.1 Maintenance Release 2 or later.

See Also

Plugin Details

Severity: High

ID: 56980

File Name: google_sketchup_7_1_m2.nasl

Version: $Revision: 1.4 $

Type: local

Agent: windows

Family: Windows

Published: 2011/11/30

Modified: 2016/10/10

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 8.4

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:POC/RL:U/RC:ND

Vulnerability Information

CPE: cpe:/a:google:google_sketchup

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2010/01/13

Vulnerability Publication Date: 2009/07/31

Reference Information

CVE: CVE-2010-0316, CVE-2010-0280

BID: 35911, 37708

OSVDB: 61794, 61685

CWE: 189