Vulnerability Note VU#586958

SketchUp Viewer buffer overflow vulnerability

Original Release date: 12 Dec 2013 | Last revised: 13 Dec 2013


SketchUp Viewer version 13.0.4124 is vulnerable to a buffer overflow when opening a malformed .SKP file.


CWE-121: Stack-based Buffer Overflow - CVE-2013-6038

SketchUp Viewer version 13.0.4124 is vulnerable to a stack buffer overflow when parsing a specially crafted .SKP file. When executed, it may allow a remote unauthenticated attacker to run arbitrary code in the context of the logged in user. It is unknown if other versions of this software are also affected.


By convincing a user to open a specially crafted .SKP file with SketchUp, a remote unauthenticated attacker could execute arbitrary code on a vulnerable system in the context of the logged in user.


We are currently unaware of a practical solution to this problem.

Use the Microsoft Enhanced Mitigation Experience Toolkit

The Microsoft Enhanced Mitigation Experience Toolkit (EMET) can be used to help prevent exploitation of these vulnerabilities.

Use caution when opening email attachments

See US-CERT tip ST04-010 for details.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
SketchUpAffected24 Sep 201313 Dec 2013
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base 4.4 AV:L/AC:M/Au:N/C:P/I:P/A:P
Temporal 4.0 E:POC/RL:U/RC:C
Environmental 1.0 CDP:N/TD:L/CR:ND/IR:ND/AR:ND



Thanks to Christopher Gabriel of Telos Corporation for reporting this vulnerability.

This document was written by Chris King.

Other Information

  • CVE IDs: CVE-2013-6038
  • Date Public: 12 Dec 2013
  • Date First Published: 12 Dec 2013
  • Date Last Updated: 13 Dec 2013
  • Document Revision: 15


If you have feedback, comments, or additional information about this vulnerability, please send us email.