CVE-2020-13497

Source
https://cve.org/CVERecord?id=CVE-2020-13497
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-13497.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2020-13497
Published
2020-12-02T18:15:12.417Z
Modified
2025-11-14T10:37:55.763084Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

An exploitable vulnerability exists in the way Pixar OpenUSD 20.05 handles parses certain encoded types. A specially crafted malformed file can trigger an arbitrary out of bounds memory access in String Type Index. This vulnerability could be used to bypass mitigations and aid further exploitation. To trigger this vulnerability, the victim needs to access an attacker-provided malformed file.

References

Affected packages

Git / github.com/pixaranimationstudios/usd

Affected ranges

Type
GIT
Repo
https://github.com/pixaranimationstudios/usd
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

v0.*

v0.7.0
v0.7.1
v0.7.2
v0.7.3
v0.7.4
v0.7.5
v0.7.6
v0.8.0
v0.8.1
v0.8.2
v0.8.3
v0.8.4
v0.8.5
v0.8.5a

v18.*

v18.09
v18.11

v19.*

v19.01
v19.03
v19.05
v19.07
v19.11

v20.*

v20.02
v20.05

Database specific

source

"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-13497.json"