All the vulnerabilites related to autodesk - design_review
cve-2021-27038
Vulnerability from cvelistv5
Published
2021-07-09 14:17
Modified
2024-08-03 20:40
Severity ?
EPSS score ?
Summary
A Type Confusion vulnerability in Autodesk Design Review 2018, 2017, 2013, 2012, 2011 can occur when processing a maliciously crafted PDF file. A malicious actor can leverage this to execute arbitrary code.
References
▼ | URL | Tags |
---|---|---|
https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Autodesk Design Review |
Version: 2018, 2017, 2013, 2012, 2011 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:40:47.303Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Autodesk Design Review", "vendor": "n/a", "versions": [ { "status": "affected", "version": "2018,\u00a02017,\u00a02013, 2012, 2011" } ] } ], "descriptions": [ { "lang": "en", "value": "A Type Confusion vulnerability in Autodesk Design Review 2018, 2017, 2013, 2012, 2011 can occur when processing a maliciously crafted PDF file. A malicious actor can leverage this to execute arbitrary code." } ], "problemTypes": [ { "descriptions": [ { "description": "Type Confusion RCE Vulnerability ", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-18T16:20:51", "orgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "shortName": "autodesk" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@autodesk.com", "ID": "CVE-2021-27038", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Autodesk Design Review", "version": { "version_data": [ { "version_value": "2018,\u00a02017,\u00a02013, 2012, 2011" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A Type Confusion vulnerability in Autodesk Design Review 2018, 2017, 2013, 2012, 2011 can occur when processing a maliciously crafted PDF file. A malicious actor can leverage this to execute arbitrary code." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Type Confusion RCE Vulnerability " } ] } ] }, "references": { "reference_data": [ { "name": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004", "refsource": "MISC", "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ] } } } }, "cveMetadata": { "assignerOrgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "assignerShortName": "autodesk", "cveId": "CVE-2021-27038", "datePublished": "2021-07-09T14:17:59", "dateReserved": "2021-02-09T00:00:00", "dateUpdated": "2024-08-03T20:40:47.303Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-27871
Vulnerability from cvelistv5
Published
2022-06-21 14:23
Modified
2024-08-03 05:41
Severity ?
EPSS score ?
Summary
Autodesk AutoCAD product suite, Revit, Design Review and Navisworks releases using PDFTron prior to 9.1.17 version may be used to write beyond the allocated buffer while parsing PDF files. This vulnerability may be exploited to execute arbitrary code.
References
▼ | URL | Tags |
---|---|---|
https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0011 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Autodesk AutoCAD product suite, Revit, Design Review and Navisworks |
Version: 2022, 2021, 2020,2019 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:41:10.620Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0011" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Autodesk AutoCAD product suite, Revit, Design Review and Navisworks", "vendor": "n/a", "versions": [ { "status": "affected", "version": "2022, 2021, 2020,2019" } ] } ], "descriptions": [ { "lang": "en", "value": "Autodesk AutoCAD product suite, Revit, Design Review and Navisworks releases using PDFTron prior to 9.1.17 version may be used to write beyond the allocated buffer while parsing PDF files. This vulnerability may be exploited to execute arbitrary code." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap-based Buffer Overflow vul", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-21T14:23:33", "orgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "shortName": "autodesk" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0011" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@autodesk.com", "ID": "CVE-2022-27871", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Autodesk AutoCAD product suite, Revit, Design Review and Navisworks", "version": { "version_data": [ { "version_value": "2022, 2021, 2020,2019" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Autodesk AutoCAD product suite, Revit, Design Review and Navisworks releases using PDFTron prior to 9.1.17 version may be used to write beyond the allocated buffer while parsing PDF files. This vulnerability may be exploited to execute arbitrary code." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Heap-based Buffer Overflow vul" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0011", "refsource": "MISC", "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0011" } ] } } } }, "cveMetadata": { "assignerOrgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "assignerShortName": "autodesk", "cveId": "CVE-2022-27871", "datePublished": "2022-06-21T14:23:33", "dateReserved": "2022-03-25T00:00:00", "dateUpdated": "2024-08-03T05:41:10.620Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-4472
Vulnerability from cvelistv5
Published
2008-10-07 18:27
Modified
2024-08-07 10:17
Severity ?
EPSS score ?
Summary
The UpdateEngine class in the LiveUpdate ActiveX control (LiveUpdate16.DLL 17.2.56), as used in Revit Architecture 2009 SP2 and Autodesk Design Review 2009, allows remote attackers to execute arbitrary programs via the second argument to the ApplyPatch method.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/45521 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/31490 | vdb-entry, x_refsource_BID | |
http://usa.autodesk.com/adsk/servlet/ps/dl/item?siteID=123112&id=12452198&linkID=11705366 | x_refsource_MISC | |
https://www.exploit-db.com/exploits/6630 | exploit, x_refsource_EXPLOIT-DB | |
http://images.autodesk.com/adsk/files/live_update_hotfix0.html | x_refsource_MISC | |
http://securityreason.com/securityalert/4361 | third-party-advisory, x_refsource_SREASON | |
http://retrogod.altervista.org/9sg_autodesk_revit_arch_2009_exploit.html | x_refsource_MISC | |
http://www.vupen.com/english/advisories/2008/2704 | vdb-entry, x_refsource_VUPEN | |
http://www.securityfocus.com/archive/1/496847/100/0/threaded | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T10:17:09.987Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "designreview-liveupdate-unauth-access(45521)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45521" }, { "name": "31490", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/31490" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://usa.autodesk.com/adsk/servlet/ps/dl/item?siteID=123112\u0026id=12452198\u0026linkID=11705366" }, { "name": "6630", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/6630" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://images.autodesk.com/adsk/files/live_update_hotfix0.html" }, { "name": "4361", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/4361" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://retrogod.altervista.org/9sg_autodesk_revit_arch_2009_exploit.html" }, { "name": "ADV-2008-2704", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2704" }, { "name": "20080930 Autodesk DWF Viewer Control / LiveUpdate Module remote code execution exploit", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/496847/100/0/threaded" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-09-30T00:00:00", "descriptions": [ { "lang": "en", "value": "The UpdateEngine class in the LiveUpdate ActiveX control (LiveUpdate16.DLL 17.2.56), as used in Revit Architecture 2009 SP2 and Autodesk Design Review 2009, allows remote attackers to execute arbitrary programs via the second argument to the ApplyPatch method." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-11T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "designreview-liveupdate-unauth-access(45521)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45521" }, { "name": "31490", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/31490" }, { "tags": [ "x_refsource_MISC" ], "url": "http://usa.autodesk.com/adsk/servlet/ps/dl/item?siteID=123112\u0026id=12452198\u0026linkID=11705366" }, { "name": "6630", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/6630" }, { "tags": [ "x_refsource_MISC" ], "url": "http://images.autodesk.com/adsk/files/live_update_hotfix0.html" }, { "name": "4361", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/4361" }, { "tags": [ "x_refsource_MISC" ], "url": "http://retrogod.altervista.org/9sg_autodesk_revit_arch_2009_exploit.html" }, { "name": "ADV-2008-2704", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2704" }, { "name": "20080930 Autodesk DWF Viewer Control / LiveUpdate Module remote code execution exploit", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/496847/100/0/threaded" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-4472", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The UpdateEngine class in the LiveUpdate ActiveX control (LiveUpdate16.DLL 17.2.56), as used in Revit Architecture 2009 SP2 and Autodesk Design Review 2009, allows remote attackers to execute arbitrary programs via the second argument to the ApplyPatch method." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "designreview-liveupdate-unauth-access(45521)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45521" }, { "name": "31490", "refsource": "BID", "url": "http://www.securityfocus.com/bid/31490" }, { "name": "http://usa.autodesk.com/adsk/servlet/ps/dl/item?siteID=123112\u0026id=12452198\u0026linkID=11705366", "refsource": "MISC", "url": "http://usa.autodesk.com/adsk/servlet/ps/dl/item?siteID=123112\u0026id=12452198\u0026linkID=11705366" }, { "name": "6630", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/6630" }, { "name": "http://images.autodesk.com/adsk/files/live_update_hotfix0.html", "refsource": "MISC", "url": "http://images.autodesk.com/adsk/files/live_update_hotfix0.html" }, { "name": "4361", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/4361" }, { "name": "http://retrogod.altervista.org/9sg_autodesk_revit_arch_2009_exploit.html", "refsource": "MISC", "url": "http://retrogod.altervista.org/9sg_autodesk_revit_arch_2009_exploit.html" }, { "name": "ADV-2008-2704", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2704" }, { "name": "20080930 Autodesk DWF Viewer Control / LiveUpdate Module remote code execution exploit", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/496847/100/0/threaded" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-4472", "datePublished": "2008-10-07T18:27:00", "dateReserved": "2008-10-07T00:00:00", "dateUpdated": "2024-08-07T10:17:09.987Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-27034
Vulnerability from cvelistv5
Published
2021-07-09 14:16
Modified
2024-08-03 20:40
Severity ?
EPSS score ?
Summary
A heap-based buffer overflow could occur while parsing PICT, PCX, RCL or TIFF files in Autodesk Design Review 2018, 2017, 2013, 2012, 2011. This vulnerability can be exploited to execute arbitrary code.
References
▼ | URL | Tags |
---|---|---|
https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0003 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-21-1127/ | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-21-1132/ | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-21-1125/ | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-21-1126/ | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-21-1128/ | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-21-1129/ | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-21-1130/ | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-21-1131/ | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Autodesk Design Review |
Version: 2018, 2017, 2013, 2012, 2011 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:40:47.208Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0003" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1127/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1132/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1125/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1126/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1128/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1129/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1130/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1131/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Autodesk Design Review", "vendor": "n/a", "versions": [ { "status": "affected", "version": "2018,\u00a02017,\u00a02013, 2012, 2011" } ] } ], "descriptions": [ { "lang": "en", "value": "A heap-based buffer overflow could occur while parsing PICT, PCX, RCL or TIFF files in Autodesk Design Review 2018, 2017, 2013, 2012, 2011. This vulnerability can be exploited to execute arbitrary code." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap Overflow Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-09T13:25:05", "orgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "shortName": "autodesk" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0003" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1127/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1132/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1125/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1126/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1128/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1129/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1130/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1131/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@autodesk.com", "ID": "CVE-2021-27034", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Autodesk Design Review", "version": { "version_data": [ { "version_value": "2018,\u00a02017,\u00a02013, 2012, 2011" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A heap-based buffer overflow could occur while parsing PICT, PCX, RCL or TIFF files in Autodesk Design Review 2018, 2017, 2013, 2012, 2011. This vulnerability can be exploited to execute arbitrary code." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Heap Overflow Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0003", "refsource": "MISC", "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0003" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-1127/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1127/" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-1132/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1132/" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-1125/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1125/" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-1126/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1126/" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-1128/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1128/" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-1129/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1129/" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-1130/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1130/" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-1131/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1131/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "assignerShortName": "autodesk", "cveId": "CVE-2021-27034", "datePublished": "2021-07-09T14:16:05", "dateReserved": "2021-02-09T00:00:00", "dateUpdated": "2024-08-03T20:40:47.208Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-42939
Vulnerability from cvelistv5
Published
2022-10-21 00:00
Modified
2024-08-03 13:19
Severity ?
EPSS score ?
Summary
A malicious crafted TGA file when consumed through DesignReview.exe application could lead to memory corruption vulnerability. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Autodesk Design Review |
Version: 2018, 2017, 2013, 2012, 2011 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:19:05.494Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Autodesk Design Review", "vendor": "n/a", "versions": [ { "status": "affected", "version": "2018,\u00a02017,\u00a02013, 2012, 2011" } ] } ], "descriptions": [ { "lang": "en", "value": "A malicious crafted TGA file when consumed through DesignReview.exe application could lead to memory corruption vulnerability. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory corruption vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-21T00:00:00", "orgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "shortName": "autodesk" }, "references": [ { "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ] } }, "cveMetadata": { "assignerOrgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "assignerShortName": "autodesk", "cveId": "CVE-2022-42939", "datePublished": "2022-10-21T00:00:00", "dateReserved": "2022-10-14T00:00:00", "dateUpdated": "2024-08-03T13:19:05.494Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40165
Vulnerability from cvelistv5
Published
2022-10-07 00:00
Modified
2024-08-04 02:27
Severity ?
EPSS score ?
Summary
A maliciously crafted TIFF, PICT, TGA, or RLC file in Autodesk Image Processing component may be used to write beyond the allocated buffer while parsing TIFF, PICT, TGA, or RLC files. This vulnerability may be exploited to execute arbitrary code.
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.537Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0011" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Revit, Inventor, Infraworks, Navisworks, Fusion, Infrastructure Parts Editors, Autodesk Advanced Steel, Civil 3D, AutoCAD, AutoCAD LT, AutoCAD Architecture, AutoCAD Electrical, AutoCAD Map 3D, AutoCAD Mechanical, AutoCAD MEP, AutoCAD Plant 3D", "vendor": "n/a", "versions": [ { "status": "affected", "version": "2022, 2021, 2020, 2019" } ] } ], "descriptions": [ { "lang": "en", "value": "A maliciously crafted TIFF, PICT, TGA, or RLC file in Autodesk Image Processing component may be used to write beyond the allocated buffer while parsing TIFF, PICT, TGA, or RLC files. This vulnerability may be exploited to execute arbitrary code." } ], "problemTypes": [ { "descriptions": [ { "description": "Buffer Overflow", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-07T00:00:00", "orgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "shortName": "autodesk" }, "references": [ { "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0011" } ] } }, "cveMetadata": { "assignerOrgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "assignerShortName": "autodesk", "cveId": "CVE-2021-40165", "datePublished": "2022-10-07T00:00:00", "dateReserved": "2021-08-27T00:00:00", "dateUpdated": "2024-08-04T02:27:31.537Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-9268
Vulnerability from cvelistv5
Published
2014-12-08 16:00
Modified
2024-08-06 13:40
Severity ?
EPSS score ?
Summary
The AdView.AdViewer.1 ActiveX control in Autodesk Design Review (ADR) before 2013 Hotfix 1 allows remote attackers to execute arbitrary code via a crafted DWF file.
References
▼ | URL | Tags |
---|---|---|
http://knowledge.autodesk.com/support/design-review/downloads/caas/downloads/content/autodesk-design-review-2013-hotfix.html | x_refsource_CONFIRM | |
http://www.zerodayinitiative.com/advisories/ZDI-14-402/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:40:24.792Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://knowledge.autodesk.com/support/design-review/downloads/caas/downloads/content/autodesk-design-review-2013-hotfix.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-402/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-12-04T00:00:00", "descriptions": [ { "lang": "en", "value": "The AdView.AdViewer.1 ActiveX control in Autodesk Design Review (ADR) before 2013 Hotfix 1 allows remote attackers to execute arbitrary code via a crafted DWF file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-12-08T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://knowledge.autodesk.com/support/design-review/downloads/caas/downloads/content/autodesk-design-review-2013-hotfix.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-402/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-9268", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The AdView.AdViewer.1 ActiveX control in Autodesk Design Review (ADR) before 2013 Hotfix 1 allows remote attackers to execute arbitrary code via a crafted DWF file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://knowledge.autodesk.com/support/design-review/downloads/caas/downloads/content/autodesk-design-review-2013-hotfix.html", "refsource": "CONFIRM", "url": "http://knowledge.autodesk.com/support/design-review/downloads/caas/downloads/content/autodesk-design-review-2013-hotfix.html" }, { "name": "http://www.zerodayinitiative.com/advisories/ZDI-14-402/", "refsource": "MISC", "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-402/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-9268", "datePublished": "2014-12-08T16:00:00", "dateReserved": "2014-12-04T00:00:00", "dateUpdated": "2024-08-06T13:40:24.792Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-42943
Vulnerability from cvelistv5
Published
2022-10-21 00:00
Modified
2024-08-03 13:19
Severity ?
EPSS score ?
Summary
A malicious crafted dwf or .pct file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by read access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Autodesk Design Review |
Version: 2018, 2017, 2013, 2012, 2011 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:19:05.515Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Autodesk Design Review", "vendor": "n/a", "versions": [ { "status": "affected", "version": "2018,\u00a02017,\u00a02013, 2012, 2011" } ] } ], "descriptions": [ { "lang": "en", "value": "A malicious crafted dwf or .pct file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by read access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory corruption vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-21T00:00:00", "orgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "shortName": "autodesk" }, "references": [ { "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ] } }, "cveMetadata": { "assignerOrgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "assignerShortName": "autodesk", "cveId": "CVE-2022-42943", "datePublished": "2022-10-21T00:00:00", "dateReserved": "2022-10-14T00:00:00", "dateUpdated": "2024-08-03T13:19:05.515Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41309
Vulnerability from cvelistv5
Published
2022-10-21 00:00
Modified
2024-08-03 12:42
Severity ?
EPSS score ?
Summary
A malicious crafted .dwf or .pct file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Autodesk Design Review |
Version: 2018, 2017, 2013, 2012, 2011 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:42:45.418Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Autodesk Design Review", "vendor": "n/a", "versions": [ { "status": "affected", "version": "2018,\u00a02017,\u00a02013, 2012, 2011" } ] } ], "descriptions": [ { "lang": "en", "value": "A malicious crafted .dwf or .pct file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory corruption Read", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-21T00:00:00", "orgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "shortName": "autodesk" }, "references": [ { "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ] } }, "cveMetadata": { "assignerOrgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "assignerShortName": "autodesk", "cveId": "CVE-2022-41309", "datePublished": "2022-10-21T00:00:00", "dateReserved": "2022-09-21T00:00:00", "dateUpdated": "2024-08-03T12:42:45.418Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-27036
Vulnerability from cvelistv5
Published
2021-07-09 14:17
Modified
2024-08-03 20:40
Severity ?
EPSS score ?
Summary
A maliciously crafted PCX, PICT, RCL, TIF, BMP, PSD or TIFF file can be used to write beyond the allocated buffer while parsing PCX, PDF, PICT, RCL, BMP, PSD or TIFF files. This vulnerability can be exploited to execute arbitrary code
References
▼ | URL | Tags |
---|---|---|
https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Autodesk Design Review |
Version: 2018, 2017, 2013, 2012, 2011 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:40:47.010Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Autodesk Design Review", "vendor": "n/a", "versions": [ { "status": "affected", "version": "2018,\u00a02017,\u00a02013, 2012, 2011" } ] } ], "descriptions": [ { "lang": "en", "value": "A maliciously crafted PCX, PICT, RCL, TIF, BMP, PSD or TIFF file can be used to write beyond the allocated buffer while parsing PCX, PDF, PICT, RCL, BMP, PSD or TIFF files. This vulnerability can be exploited to execute arbitrary code" } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds Write", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-18T16:20:50", "orgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "shortName": "autodesk" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@autodesk.com", "ID": "CVE-2021-27036", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Autodesk Design Review", "version": { "version_data": [ { "version_value": "2018,\u00a02017,\u00a02013, 2012, 2011" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A maliciously crafted PCX, PICT, RCL, TIF, BMP, PSD or TIFF file can be used to write beyond the allocated buffer while parsing PCX, PDF, PICT, RCL, BMP, PSD or TIFF files. This vulnerability can be exploited to execute arbitrary code" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Write" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004", "refsource": "MISC", "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ] } } } }, "cveMetadata": { "assignerOrgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "assignerShortName": "autodesk", "cveId": "CVE-2021-27036", "datePublished": "2021-07-09T14:17:01", "dateReserved": "2021-02-09T00:00:00", "dateUpdated": "2024-08-03T20:40:47.010Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-42937
Vulnerability from cvelistv5
Published
2022-10-21 00:00
Modified
2024-08-03 13:19
Severity ?
EPSS score ?
Summary
A malicious crafted .dwf or .pct file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Autodesk Design Review |
Version: 2018, 2017, 2013, 2012, 2011 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:19:05.519Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Autodesk Design Review", "vendor": "n/a", "versions": [ { "status": "affected", "version": "2018,\u00a02017,\u00a02013, 2012, 2011" } ] } ], "descriptions": [ { "lang": "en", "value": "A malicious crafted .dwf or .pct file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory corruption Read", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-21T00:00:00", "orgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "shortName": "autodesk" }, "references": [ { "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ] } }, "cveMetadata": { "assignerOrgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "assignerShortName": "autodesk", "cveId": "CVE-2022-42937", "datePublished": "2022-10-21T00:00:00", "dateReserved": "2022-10-14T00:00:00", "dateUpdated": "2024-08-03T13:19:05.519Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-7362
Vulnerability from cvelistv5
Published
2019-08-23 19:35
Modified
2024-08-04 20:46
Severity ?
EPSS score ?
Summary
DLL preloading vulnerability in Autodesk Design Review versions 2011, 2012, 2013, and 2018. An attacker may trick a user into opening a malicious DWF file that may leverage a DLL preloading vulnerability, which may result in code execution.
References
▼ | URL | Tags |
---|---|---|
https://www.autodesk.com/trust/security-advisories/adsk-sa-2019-0002 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Autodesk Design Review |
Version: 2011, 2012, 2013, 2018 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:46:46.181Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2019-0002" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Autodesk Design Review ", "vendor": "n/a", "versions": [ { "status": "affected", "version": "2011, 2012, 2013, 2018" } ] } ], "descriptions": [ { "lang": "en", "value": "DLL preloading vulnerability in Autodesk Design Review versions 2011, 2012, 2013, and 2018. An attacker may trick a user into opening a malicious DWF file that may leverage a DLL preloading vulnerability, which may result in code execution." } ], "problemTypes": [ { "descriptions": [ { "description": "DLL preloading vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-08-23T19:35:31", "orgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "shortName": "autodesk" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2019-0002" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@autodesk.com", "ID": "CVE-2019-7362", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Autodesk Design Review ", "version": { "version_data": [ { "version_value": "2011, 2012, 2013, 2018" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "DLL preloading vulnerability in Autodesk Design Review versions 2011, 2012, 2013, and 2018. An attacker may trick a user into opening a malicious DWF file that may leverage a DLL preloading vulnerability, which may result in code execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "DLL preloading vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2019-0002", "refsource": "CONFIRM", "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2019-0002" } ] } } } }, "cveMetadata": { "assignerOrgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "assignerShortName": "autodesk", "cveId": "CVE-2019-7362", "datePublished": "2019-08-23T19:35:31", "dateReserved": "2019-02-04T00:00:00", "dateUpdated": "2024-08-04T20:46:46.181Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40163
Vulnerability from cvelistv5
Published
2022-10-07 00:00
Modified
2024-08-04 02:27
Severity ?
EPSS score ?
Summary
A Memory Corruption vulnerability may lead to code execution through maliciously crafted DLL files through Autodesk Image Processing component.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Revit, Inventor, Infraworks, Navisworks, Fusion, Infrastructure Parts Editors, Autodesk Advanced Steel, Civil 3D, AutoCAD, AutoCAD LT, AutoCAD Architecture, AutoCAD Electrical, AutoCAD Map 3D, AutoCAD Mechanical, AutoCAD MEP, AutoCAD Plant 3D |
Version: 2022, 2021, 2020, 2019 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.853Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0011" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Revit, Inventor, Infraworks, Navisworks, Fusion, Infrastructure Parts Editors, Autodesk Advanced Steel, Civil 3D, AutoCAD, AutoCAD LT, AutoCAD Architecture, AutoCAD Electrical, AutoCAD Map 3D, AutoCAD Mechanical, AutoCAD MEP, AutoCAD Plant 3D", "vendor": "n/a", "versions": [ { "status": "affected", "version": "2022, 2021, 2020, 2019" } ] } ], "descriptions": [ { "lang": "en", "value": "A Memory Corruption vulnerability may lead to code execution through maliciously crafted DLL files through Autodesk Image Processing component." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory Corruption ", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-07T00:00:00", "orgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "shortName": "autodesk" }, "references": [ { "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0011" } ] } }, "cveMetadata": { "assignerOrgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "assignerShortName": "autodesk", "cveId": "CVE-2021-40163", "datePublished": "2022-10-07T00:00:00", "dateReserved": "2021-08-27T00:00:00", "dateUpdated": "2024-08-04T02:27:31.853Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-42934
Vulnerability from cvelistv5
Published
2022-10-21 00:00
Modified
2024-08-03 13:19
Severity ?
EPSS score ?
Summary
A malicious crafted .dwf or .pct file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Autodesk Design Review |
Version: 2018, 2017, 2013, 2012, 2011 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:19:05.524Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Autodesk Design Review", "vendor": "n/a", "versions": [ { "status": "affected", "version": "2018,\u00a02017,\u00a02013, 2012, 2011" } ] } ], "descriptions": [ { "lang": "en", "value": "A malicious crafted .dwf or .pct file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory corruption Read", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-21T00:00:00", "orgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "shortName": "autodesk" }, "references": [ { "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ] } }, "cveMetadata": { "assignerOrgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "assignerShortName": "autodesk", "cveId": "CVE-2022-42934", "datePublished": "2022-10-21T00:00:00", "dateReserved": "2022-10-14T00:00:00", "dateUpdated": "2024-08-03T13:19:05.524Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-42936
Vulnerability from cvelistv5
Published
2022-10-21 00:00
Modified
2024-08-03 13:19
Severity ?
EPSS score ?
Summary
A malicious crafted .dwf or .pct file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Autodesk Design Review |
Version: 2018, 2017, 2013, 2012, 2011 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:19:05.535Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Autodesk Design Review", "vendor": "n/a", "versions": [ { "status": "affected", "version": "2018,\u00a02017,\u00a02013, 2012, 2011" } ] } ], "descriptions": [ { "lang": "en", "value": "A malicious crafted .dwf or .pct file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory corruption Read", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-21T00:00:00", "orgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "shortName": "autodesk" }, "references": [ { "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ] } }, "cveMetadata": { "assignerOrgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "assignerShortName": "autodesk", "cveId": "CVE-2022-42936", "datePublished": "2022-10-21T00:00:00", "dateReserved": "2022-10-14T00:00:00", "dateUpdated": "2024-08-03T13:19:05.535Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-27037
Vulnerability from cvelistv5
Published
2021-07-09 14:17
Modified
2024-08-03 20:40
Severity ?
EPSS score ?
Summary
A maliciously crafted PNG, PDF or DWF file in Autodesk Design Review 2018, 2017, 2013, 2012, 2011 can be used to attempt to free an object that has already been freed while parsing them. This vulnerability may be exploited by remote malicious actors to execute arbitrary code.
References
▼ | URL | Tags |
---|---|---|
https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Autodesk Design Review |
Version: 2018, 2017, 2013, 2012, 2011 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:40:47.379Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Autodesk Design Review", "vendor": "n/a", "versions": [ { "status": "affected", "version": "2018,\u00a02017,\u00a02013, 2012, 2011" } ] } ], "descriptions": [ { "lang": "en", "value": "A maliciously crafted PNG, PDF or DWF file in Autodesk Design Review 2018, 2017, 2013, 2012, 2011 can be used to attempt to free an object that has already been freed while parsing them. This vulnerability may be exploited by remote malicious actors to execute arbitrary code." } ], "problemTypes": [ { "descriptions": [ { "description": "Use-After-Free Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-18T16:20:51", "orgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "shortName": "autodesk" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@autodesk.com", "ID": "CVE-2021-27037", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Autodesk Design Review", "version": { "version_data": [ { "version_value": "2018,\u00a02017,\u00a02013, 2012, 2011" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A maliciously crafted PNG, PDF or DWF file in Autodesk Design Review 2018, 2017, 2013, 2012, 2011 can be used to attempt to free an object that has already been freed while parsing them. This vulnerability may be exploited by remote malicious actors to execute arbitrary code." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Use-After-Free Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004", "refsource": "MISC", "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ] } } } }, "cveMetadata": { "assignerOrgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "assignerShortName": "autodesk", "cveId": "CVE-2021-27037", "datePublished": "2021-07-09T14:17:32", "dateReserved": "2021-02-09T00:00:00", "dateUpdated": "2024-08-03T20:40:47.379Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-8572
Vulnerability from cvelistv5
Published
2015-12-15 21:00
Modified
2024-09-16 17:28
Severity ?
EPSS score ?
Summary
Multiple buffer overflows in Autodesk Design Review (ADR) before 2013 Hotfix 2 allow remote attackers to execute arbitrary code via crafted RLE data in a (1) BMP or (2) FLI file, (3) encoded scan lines in a PCX file, or (4) DataSubBlock or (5) GlobalColorTable in a GIF file.
References
▼ | URL | Tags |
---|---|---|
http://www.zerodayinitiative.com/advisories/ZDI-15-615 | x_refsource_MISC | |
http://www.zerodayinitiative.com/advisories/ZDI-15-620 | x_refsource_MISC | |
http://www.zerodayinitiative.com/advisories/ZDI-15-619 | x_refsource_MISC | |
http://www.zerodayinitiative.com/advisories/ZDI-15-618 | x_refsource_MISC | |
http://www.zerodayinitiative.com/advisories/ZDI-15-616 | x_refsource_MISC | |
https://knowledge.autodesk.com/support/design-review/downloads/caas/downloads/content/autodesk-design-review-2013-hotfix.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T08:20:43.468Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-615" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-620" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-619" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-618" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-616" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://knowledge.autodesk.com/support/design-review/downloads/caas/downloads/content/autodesk-design-review-2013-hotfix.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in Autodesk Design Review (ADR) before 2013 Hotfix 2 allow remote attackers to execute arbitrary code via crafted RLE data in a (1) BMP or (2) FLI file, (3) encoded scan lines in a PCX file, or (4) DataSubBlock or (5) GlobalColorTable in a GIF file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-12-15T21:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-615" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-620" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-619" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-618" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-616" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://knowledge.autodesk.com/support/design-review/downloads/caas/downloads/content/autodesk-design-review-2013-hotfix.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-8572", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple buffer overflows in Autodesk Design Review (ADR) before 2013 Hotfix 2 allow remote attackers to execute arbitrary code via crafted RLE data in a (1) BMP or (2) FLI file, (3) encoded scan lines in a PCX file, or (4) DataSubBlock or (5) GlobalColorTable in a GIF file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.zerodayinitiative.com/advisories/ZDI-15-615", "refsource": "MISC", "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-615" }, { "name": "http://www.zerodayinitiative.com/advisories/ZDI-15-620", "refsource": "MISC", "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-620" }, { "name": "http://www.zerodayinitiative.com/advisories/ZDI-15-619", "refsource": "MISC", "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-619" }, { "name": "http://www.zerodayinitiative.com/advisories/ZDI-15-618", "refsource": "MISC", "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-618" }, { "name": "http://www.zerodayinitiative.com/advisories/ZDI-15-616", "refsource": "MISC", "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-616" }, { "name": "https://knowledge.autodesk.com/support/design-review/downloads/caas/downloads/content/autodesk-design-review-2013-hotfix.html", "refsource": "CONFIRM", "url": "https://knowledge.autodesk.com/support/design-review/downloads/caas/downloads/content/autodesk-design-review-2013-hotfix.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-8572", "datePublished": "2015-12-15T21:00:00Z", "dateReserved": "2015-12-15T00:00:00Z", "dateUpdated": "2024-09-16T17:28:36.543Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-4471
Vulnerability from cvelistv5
Published
2008-10-07 18:27
Modified
2024-08-07 10:17
Severity ?
EPSS score ?
Summary
Directory traversal vulnerability in the CExpressViewerControl class in the DWF Viewer ActiveX control (AdView.dll 9.0.0.96), as used in Revit Architecture 2009 SP2 and Autodesk Design Review 2009, allows remote attackers to overwrite arbitrary files via "..\" sequences in the argument to the SaveAS method.
References
▼ | URL | Tags |
---|---|---|
https://www.exploit-db.com/exploits/6630 | exploit, x_refsource_EXPLOIT-DB | |
http://securityreason.com/securityalert/4361 | third-party-advisory, x_refsource_SREASON | |
http://retrogod.altervista.org/9sg_autodesk_revit_arch_2009_exploit.html | x_refsource_MISC | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/45519 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/31487 | vdb-entry, x_refsource_BID | |
http://www.vupen.com/english/advisories/2008/2704 | vdb-entry, x_refsource_VUPEN | |
http://www.securityfocus.com/archive/1/496847/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://secunia.com/advisories/31989 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T10:17:09.698Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "6630", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/6630" }, { "name": "4361", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/4361" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://retrogod.altervista.org/9sg_autodesk_revit_arch_2009_exploit.html" }, { "name": "designreview-adview-file-overwrite(45519)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45519" }, { "name": "31487", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/31487" }, { "name": "ADV-2008-2704", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2704" }, { "name": "20080930 Autodesk DWF Viewer Control / LiveUpdate Module remote code execution exploit", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/496847/100/0/threaded" }, { "name": "31989", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31989" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-09-30T00:00:00", "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in the CExpressViewerControl class in the DWF Viewer ActiveX control (AdView.dll 9.0.0.96), as used in Revit Architecture 2009 SP2 and Autodesk Design Review 2009, allows remote attackers to overwrite arbitrary files via \"..\\\" sequences in the argument to the SaveAS method." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-11T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "6630", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/6630" }, { "name": "4361", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/4361" }, { "tags": [ "x_refsource_MISC" ], "url": "http://retrogod.altervista.org/9sg_autodesk_revit_arch_2009_exploit.html" }, { "name": "designreview-adview-file-overwrite(45519)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45519" }, { "name": "31487", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/31487" }, { "name": "ADV-2008-2704", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2704" }, { "name": "20080930 Autodesk DWF Viewer Control / LiveUpdate Module remote code execution exploit", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/496847/100/0/threaded" }, { "name": "31989", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31989" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-4471", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Directory traversal vulnerability in the CExpressViewerControl class in the DWF Viewer ActiveX control (AdView.dll 9.0.0.96), as used in Revit Architecture 2009 SP2 and Autodesk Design Review 2009, allows remote attackers to overwrite arbitrary files via \"..\\\" sequences in the argument to the SaveAS method." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "6630", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/6630" }, { "name": "4361", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/4361" }, { "name": "http://retrogod.altervista.org/9sg_autodesk_revit_arch_2009_exploit.html", "refsource": "MISC", "url": "http://retrogod.altervista.org/9sg_autodesk_revit_arch_2009_exploit.html" }, { "name": "designreview-adview-file-overwrite(45519)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45519" }, { "name": "31487", "refsource": "BID", "url": "http://www.securityfocus.com/bid/31487" }, { "name": "ADV-2008-2704", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2704" }, { "name": "20080930 Autodesk DWF Viewer Control / LiveUpdate Module remote code execution exploit", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/496847/100/0/threaded" }, { "name": "31989", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31989" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-4471", "datePublished": "2008-10-07T18:27:00", "dateReserved": "2008-10-07T00:00:00", "dateUpdated": "2024-08-07T10:17:09.698Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-27526
Vulnerability from cvelistv5
Published
2022-04-18 16:20
Modified
2024-08-03 05:32
Severity ?
EPSS score ?
Summary
A malicious crafted TGA file when consumed through DesignReview.exe application could lead to memory corruption vulnerability. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
References
▼ | URL | Tags |
---|---|---|
https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Autodesk Design Review |
Version: 2018, 2017, 2013, 2012, 2011 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:32:59.244Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Autodesk Design Review", "vendor": "n/a", "versions": [ { "status": "affected", "version": "2018,\u00a02017,\u00a02013, 2012, 2011" } ] } ], "descriptions": [ { "lang": "en", "value": "A malicious crafted TGA file when consumed through DesignReview.exe application could lead to memory corruption vulnerability. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory Corruption", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-18T16:20:26", "orgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "shortName": "autodesk" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@autodesk.com", "ID": "CVE-2022-27526", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Autodesk Design Review", "version": { "version_data": [ { "version_value": "2018,\u00a02017,\u00a02013, 2012, 2011" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A malicious crafted TGA file when consumed through DesignReview.exe application could lead to memory corruption vulnerability. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory Corruption" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004", "refsource": "MISC", "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ] } } } }, "cveMetadata": { "assignerOrgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "assignerShortName": "autodesk", "cveId": "CVE-2022-27526", "datePublished": "2022-04-18T16:20:26", "dateReserved": "2022-03-21T00:00:00", "dateUpdated": "2024-08-03T05:32:59.244Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41310
Vulnerability from cvelistv5
Published
2022-10-21 00:00
Modified
2024-08-03 12:42
Severity ?
EPSS score ?
Summary
A malicious crafted .dwf or .pct file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Autodesk Design Review |
Version: 2018, 2017, 2013, 2012, 2011 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:42:45.331Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Autodesk Design Review", "vendor": "n/a", "versions": [ { "status": "affected", "version": "2018,\u00a02017,\u00a02013, 2012, 2011" } ] } ], "descriptions": [ { "lang": "en", "value": "A malicious crafted .dwf or .pct file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory corruption Read", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-21T00:00:00", "orgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "shortName": "autodesk" }, "references": [ { "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ] } }, "cveMetadata": { "assignerOrgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "assignerShortName": "autodesk", "cveId": "CVE-2022-41310", "datePublished": "2022-10-21T00:00:00", "dateReserved": "2022-09-21T00:00:00", "dateUpdated": "2024-08-03T12:42:45.331Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-8571
Vulnerability from cvelistv5
Published
2015-12-15 21:00
Modified
2024-08-06 08:20
Severity ?
EPSS score ?
Summary
Integer overflow in Autodesk Design Review (ADR) before 2013 Hotfix 2 allows remote attackers to execute arbitrary code via a crafted biClrUsed value in a BMP file, which triggers a buffer overflow.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/79800 | vdb-entry, x_refsource_BID | |
http://www.zerodayinitiative.com/advisories/ZDI-15-617 | x_refsource_MISC | |
https://knowledge.autodesk.com/support/design-review/downloads/caas/downloads/content/autodesk-design-review-2013-hotfix.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T08:20:43.265Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "79800", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/79800" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-617" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://knowledge.autodesk.com/support/design-review/downloads/caas/downloads/content/autodesk-design-review-2013-hotfix.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-12-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Integer overflow in Autodesk Design Review (ADR) before 2013 Hotfix 2 allows remote attackers to execute arbitrary code via a crafted biClrUsed value in a BMP file, which triggers a buffer overflow." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-11-25T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "79800", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/79800" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-617" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://knowledge.autodesk.com/support/design-review/downloads/caas/downloads/content/autodesk-design-review-2013-hotfix.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-8571", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Integer overflow in Autodesk Design Review (ADR) before 2013 Hotfix 2 allows remote attackers to execute arbitrary code via a crafted biClrUsed value in a BMP file, which triggers a buffer overflow." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "79800", "refsource": "BID", "url": "http://www.securityfocus.com/bid/79800" }, { "name": "http://www.zerodayinitiative.com/advisories/ZDI-15-617", "refsource": "MISC", "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-617" }, { "name": "https://knowledge.autodesk.com/support/design-review/downloads/caas/downloads/content/autodesk-design-review-2013-hotfix.html", "refsource": "CONFIRM", "url": "https://knowledge.autodesk.com/support/design-review/downloads/caas/downloads/content/autodesk-design-review-2013-hotfix.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-8571", "datePublished": "2015-12-15T21:00:00", "dateReserved": "2015-12-15T00:00:00", "dateUpdated": "2024-08-06T08:20:43.265Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-27525
Vulnerability from cvelistv5
Published
2022-04-18 16:20
Modified
2024-08-03 05:32
Severity ?
EPSS score ?
Summary
A malicious crafted .dwf or .pct file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
References
▼ | URL | Tags |
---|---|---|
https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Autodesk® Design Review |
Version: 2018 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:32:59.158Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Autodesk\u00ae Design Review", "vendor": "n/a", "versions": [ { "status": "affected", "version": "2018" } ] } ], "descriptions": [ { "lang": "en", "value": "A malicious crafted .dwf or .pct file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory Corruption", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-03T14:17:36", "orgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "shortName": "autodesk" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@autodesk.com", "ID": "CVE-2022-27525", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Autodesk\u00ae Design Review", "version": { "version_data": [ { "version_value": "2018" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A malicious crafted .dwf or .pct file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory Corruption" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004", "refsource": "MISC", "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ] } } } }, "cveMetadata": { "assignerOrgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "assignerShortName": "autodesk", "cveId": "CVE-2022-27525", "datePublished": "2022-04-18T16:20:25", "dateReserved": "2022-03-21T00:00:00", "dateUpdated": "2024-08-03T05:32:59.158Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-42933
Vulnerability from cvelistv5
Published
2022-10-21 00:00
Modified
2024-08-03 13:19
Severity ?
EPSS score ?
Summary
A malicious crafted .dwf or .pct file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Autodesk Design Review |
Version: 2018, 2017, 2013, 2012, 2011 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:19:05.533Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Autodesk Design Review", "vendor": "n/a", "versions": [ { "status": "affected", "version": "2018,\u00a02017,\u00a02013, 2012, 2011" } ] } ], "descriptions": [ { "lang": "en", "value": "A malicious crafted .dwf or .pct file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory corruption Read", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-21T00:00:00", "orgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "shortName": "autodesk" }, "references": [ { "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ] } }, "cveMetadata": { "assignerOrgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "assignerShortName": "autodesk", "cveId": "CVE-2022-42933", "datePublished": "2022-10-21T00:00:00", "dateReserved": "2022-10-14T00:00:00", "dateUpdated": "2024-08-03T13:19:05.533Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-33889
Vulnerability from cvelistv5
Published
2022-10-03 14:22
Modified
2024-08-03 08:09
Severity ?
EPSS score ?
Summary
A maliciously crafted GIF or JPEG files when parsed through Autodesk Design Review 2018, and AutoCAD 2023 and 2022 could be used to write beyond the allocated heap buffer. This vulnerability could lead to arbitrary code execution.
References
▼ | URL | Tags |
---|---|---|
https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0021 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Autodesk® Design Review, Autodesk® Advance Steel, Autodesk® Civil 3D® |
Version: 2018, 2023, 2022 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T08:09:22.694Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0021" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Autodesk\u00ae Design Review, Autodesk\u00ae Advance Steel, Autodesk\u00ae Civil 3D\u00ae", "vendor": "n/a", "versions": [ { "status": "affected", "version": "2018, 2023, 2022" } ] } ], "descriptions": [ { "lang": "en", "value": "A maliciously crafted GIF or JPEG files when parsed through Autodesk Design Review 2018, and AutoCAD 2023 and 2022 could be used to write beyond the allocated heap buffer. This vulnerability could lead to arbitrary code execution." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap based Overflow Buffer", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-03T14:22:14", "orgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "shortName": "autodesk" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0021" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@autodesk.com", "ID": "CVE-2022-33889", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Autodesk\u00ae Design Review, Autodesk\u00ae Advance Steel, Autodesk\u00ae Civil 3D\u00ae", "version": { "version_data": [ { "version_value": "2018, 2023, 2022" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A maliciously crafted GIF or JPEG files when parsed through Autodesk Design Review 2018, and AutoCAD 2023 and 2022 could be used to write beyond the allocated heap buffer. This vulnerability could lead to arbitrary code execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Heap based Overflow Buffer" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0021", "refsource": "MISC", "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0021" } ] } } } }, "cveMetadata": { "assignerOrgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "assignerShortName": "autodesk", "cveId": "CVE-2022-33889", "datePublished": "2022-10-03T14:22:14", "dateReserved": "2022-06-16T00:00:00", "dateUpdated": "2024-08-03T08:09:22.694Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40161
Vulnerability from cvelistv5
Published
2021-12-23 18:31
Modified
2024-08-04 02:27
Severity ?
EPSS score ?
Summary
A Memory Corruption vulnerability may lead to code execution through maliciously crafted DLL files through PDFTron earlier than 9.0.7 version.
References
▼ | URL | Tags |
---|---|---|
https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0010 | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.589Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0010" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Revit, Navisworks, Autodesk\u00ae Advance Steel, AutoCAD\u00ae, AutoCAD\u00ae Architecture, AutoCAD\u00ae Electrical, AutoCAD\u00ae Map 3D, AutoCAD\u00ae Mechanical, AutoCAD\u00ae MEP, AutoCAD\u00ae Plant 3D, AutoCAD\u00ae LT, Autodesk\u00ae Civil 3D, AutoCAD\u00ae Mac, AutoCAD\u00ae LT for Mac", "vendor": "n/a", "versions": [ { "status": "affected", "version": "prior to 9.0.7" } ] } ], "descriptions": [ { "lang": "en", "value": "A Memory Corruption vulnerability may lead to code execution through maliciously crafted DLL files through PDFTron earlier than 9.0.7 version." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory Corruption Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-18T16:20:49", "orgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "shortName": "autodesk" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0010" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@autodesk.com", "ID": "CVE-2021-40161", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Revit, Navisworks, Autodesk\u00ae Advance Steel, AutoCAD\u00ae, AutoCAD\u00ae Architecture, AutoCAD\u00ae Electrical, AutoCAD\u00ae Map 3D, AutoCAD\u00ae Mechanical, AutoCAD\u00ae MEP, AutoCAD\u00ae Plant 3D, AutoCAD\u00ae LT, Autodesk\u00ae Civil 3D, AutoCAD\u00ae Mac, AutoCAD\u00ae LT for Mac", "version": { "version_data": [ { "version_value": "prior to 9.0.7" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A Memory Corruption vulnerability may lead to code execution through maliciously crafted DLL files through PDFTron earlier than 9.0.7 version." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory Corruption Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0010", "refsource": "MISC", "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0010" } ] } } } }, "cveMetadata": { "assignerOrgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "assignerShortName": "autodesk", "cveId": "CVE-2021-40161", "datePublished": "2021-12-23T18:31:43", "dateReserved": "2021-08-27T00:00:00", "dateUpdated": "2024-08-04T02:27:31.589Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-33890
Vulnerability from cvelistv5
Published
2022-10-03 00:00
Modified
2024-08-03 08:09
Severity ?
EPSS score ?
Summary
A maliciously crafted PCT or DWF file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by read access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Autodesk® Design Review, |
Version: 2018 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T08:09:22.758Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0021" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Autodesk\u00ae Design Review,", "vendor": "n/a", "versions": [ { "status": "affected", "version": "2018" } ] } ], "descriptions": [ { "lang": "en", "value": "A maliciously crafted PCT or DWF file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by read access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory corruption", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "shortName": "autodesk" }, "references": [ { "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0021" } ] } }, "cveMetadata": { "assignerOrgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "assignerShortName": "autodesk", "cveId": "CVE-2022-33890", "datePublished": "2022-10-03T00:00:00", "dateReserved": "2022-06-16T00:00:00", "dateUpdated": "2024-08-03T08:09:22.758Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40162
Vulnerability from cvelistv5
Published
2022-10-07 00:00
Modified
2024-08-04 02:27
Severity ?
EPSS score ?
Summary
A maliciously crafted TIF, PICT, TGA, or RLC files in Autodesk Image Processing component may be forced to read beyond allocated boundaries when parsing the TIFF, PICT, TGA, or RLC files. This vulnerability may be exploited to execute arbitrary code.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Revit, Inventor, Infraworks, Navisworks, Fusion, Infrastructure Parts Editors, Autodesk Advanced Steel, Civil 3D, AutoCAD, AutoCAD LT, AutoCAD Architecture, AutoCAD Electrical, AutoCAD Map 3D, AutoCAD Mechanical, AutoCAD MEP, AutoCAD Plant 3D |
Version: 2022, 2021, 2020, 2019 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.539Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0011" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Revit, Inventor, Infraworks, Navisworks, Fusion, Infrastructure Parts Editors, Autodesk Advanced Steel, Civil 3D, AutoCAD, AutoCAD LT, AutoCAD Architecture, AutoCAD Electrical, AutoCAD Map 3D, AutoCAD Mechanical, AutoCAD MEP, AutoCAD Plant 3D", "vendor": "n/a", "versions": [ { "status": "affected", "version": "2022, 2021, 2020, 2019" } ] } ], "descriptions": [ { "lang": "en", "value": "A maliciously crafted TIF, PICT, TGA, or RLC files in Autodesk Image Processing component may be forced to read beyond allocated boundaries when parsing the TIFF, PICT, TGA, or RLC files. This vulnerability may be exploited to execute arbitrary code." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-Band Read", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-07T00:00:00", "orgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "shortName": "autodesk" }, "references": [ { "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0011" } ] } }, "cveMetadata": { "assignerOrgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "assignerShortName": "autodesk", "cveId": "CVE-2021-40162", "datePublished": "2022-10-07T00:00:00", "dateReserved": "2021-08-27T00:00:00", "dateUpdated": "2024-08-04T02:27:31.539Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-7363
Vulnerability from cvelistv5
Published
2019-08-23 19:35
Modified
2024-08-04 20:46
Severity ?
EPSS score ?
Summary
Use-after-free vulnerability in Autodesk Design Review versions 2011, 2012, 2013, and 2018. An attacker may trick a user into opening a malicious DWF file that may leverage a use-after-free vulnerability, which may result in code execution.
References
▼ | URL | Tags |
---|---|---|
https://www.autodesk.com/trust/security-advisories/adsk-sa-2019-0002 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Autodesk Design Review |
Version: 2011, 2012, 2013, 2018 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:46:46.170Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2019-0002" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Autodesk Design Review ", "vendor": "n/a", "versions": [ { "status": "affected", "version": "2011, 2012, 2013, 2018" } ] } ], "descriptions": [ { "lang": "en", "value": "Use-after-free vulnerability in Autodesk Design Review versions 2011, 2012, 2013, and 2018. An attacker may trick a user into opening a malicious DWF file that may leverage a use-after-free vulnerability, which may result in code execution." } ], "problemTypes": [ { "descriptions": [ { "description": "Use-after-free vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-08-23T19:35:52", "orgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "shortName": "autodesk" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2019-0002" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@autodesk.com", "ID": "CVE-2019-7363", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Autodesk Design Review ", "version": { "version_data": [ { "version_value": "2011, 2012, 2013, 2018" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Use-after-free vulnerability in Autodesk Design Review versions 2011, 2012, 2013, and 2018. An attacker may trick a user into opening a malicious DWF file that may leverage a use-after-free vulnerability, which may result in code execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Use-after-free vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2019-0002", "refsource": "CONFIRM", "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2019-0002" } ] } } } }, "cveMetadata": { "assignerOrgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "assignerShortName": "autodesk", "cveId": "CVE-2019-7363", "datePublished": "2019-08-23T19:35:52", "dateReserved": "2019-02-04T00:00:00", "dateUpdated": "2024-08-04T20:46:46.170Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-27041
Vulnerability from cvelistv5
Published
2021-06-25 12:41
Modified
2024-08-03 20:40
Severity ?
EPSS score ?
Summary
A maliciously crafted DWG file can be used to write beyond the allocated buffer while parsing DWG files. This vulnerability can be exploited to execute arbitrary code
References
▼ | URL | Tags |
---|---|---|
https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0007 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Autodesk Advanced Steel, Civil 3D, AutoCAD, AutoCAD LT, AutoCAD Architecture, AutoCAD Electrical, AutoCAD Map 3D, AutoCAD Mechanical, AutoCAD MEP, AutoCAD Plant 3D |
Version: 2022.1.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:40:47.113Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0007" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Autodesk Advanced Steel, Civil 3D, AutoCAD, AutoCAD LT, AutoCAD Architecture, AutoCAD Electrical, AutoCAD Map 3D, AutoCAD Mechanical, AutoCAD MEP, AutoCAD Plant 3D", "vendor": "n/a", "versions": [ { "status": "affected", "version": "2022.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "A maliciously crafted DWG file can be used to write beyond the allocated buffer while parsing DWG files. This vulnerability can be exploited to execute arbitrary code" } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bound Write Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-13T17:06:06", "orgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "shortName": "autodesk" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0007" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@autodesk.com", "ID": "CVE-2021-27041", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Autodesk Advanced Steel, Civil 3D, AutoCAD, AutoCAD LT, AutoCAD Architecture, AutoCAD Electrical, AutoCAD Map 3D, AutoCAD Mechanical, AutoCAD MEP, AutoCAD Plant 3D", "version": { "version_data": [ { "version_value": "2022.1.1" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A maliciously crafted DWG file can be used to write beyond the allocated buffer while parsing DWG files. This vulnerability can be exploited to execute arbitrary code" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bound Write Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0007", "refsource": "MISC", "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0007" } ] } } } }, "cveMetadata": { "assignerOrgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "assignerShortName": "autodesk", "cveId": "CVE-2021-27041", "datePublished": "2021-06-25T12:41:13", "dateReserved": "2021-02-09T00:00:00", "dateUpdated": "2024-08-03T20:40:47.113Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-27864
Vulnerability from cvelistv5
Published
2022-07-29 19:05
Modified
2024-08-03 05:41
Severity ?
EPSS score ?
Summary
A Double Free vulnerability allows remote attackers to execute arbitrary code through DesignReview.exe application on PDF files within affected installations. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
References
▼ | URL | Tags |
---|---|---|
https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0009 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Autodesk Design Review |
Version: 2018, 2017, 2013, 2012, 2011 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:41:10.210Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0009" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Autodesk Design Review", "vendor": "n/a", "versions": [ { "status": "affected", "version": "2018, 2017, 2013, 2012, 2011" } ] } ], "descriptions": [ { "lang": "en", "value": "A Double Free vulnerability allows remote attackers to execute arbitrary code through DesignReview.exe application on PDF files within affected installations. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file." } ], "problemTypes": [ { "descriptions": [ { "description": "Double Free vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-29T19:05:31", "orgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "shortName": "autodesk" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0009" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@autodesk.com", "ID": "CVE-2022-27864", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Autodesk Design Review", "version": { "version_data": [ { "version_value": "2018, 2017, 2013, 2012, 2011" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A Double Free vulnerability allows remote attackers to execute arbitrary code through DesignReview.exe application on PDF files within affected installations. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Double Free vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0009", "refsource": "MISC", "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0009" } ] } } } }, "cveMetadata": { "assignerOrgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "assignerShortName": "autodesk", "cveId": "CVE-2022-27864", "datePublished": "2022-07-29T19:05:31", "dateReserved": "2022-03-25T00:00:00", "dateUpdated": "2024-08-03T05:41:10.210Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-42938
Vulnerability from cvelistv5
Published
2022-10-21 00:00
Modified
2024-08-03 13:19
Severity ?
EPSS score ?
Summary
A malicious crafted TGA file when consumed through DesignReview.exe application could lead to memory corruption vulnerability. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Autodesk Design Review |
Version: 2018, 2017, 2013, 2012, 2011 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:19:05.532Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Autodesk Design Review", "vendor": "n/a", "versions": [ { "status": "affected", "version": "2018,\u00a02017,\u00a02013, 2012, 2011" } ] } ], "descriptions": [ { "lang": "en", "value": "A malicious crafted TGA file when consumed through DesignReview.exe application could lead to memory corruption vulnerability. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory corruption vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-21T00:00:00", "orgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "shortName": "autodesk" }, "references": [ { "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ] } }, "cveMetadata": { "assignerOrgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "assignerShortName": "autodesk", "cveId": "CVE-2022-42938", "datePublished": "2022-10-21T00:00:00", "dateReserved": "2022-10-14T00:00:00", "dateUpdated": "2024-08-03T13:19:05.532Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-42942
Vulnerability from cvelistv5
Published
2022-10-21 00:00
Modified
2024-08-03 13:19
Severity ?
EPSS score ?
Summary
A malicious crafted dwf or .pct file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by read access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Autodesk Design Review |
Version: 2018, 2017, 2013, 2012, 2011 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:19:05.528Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Autodesk Design Review", "vendor": "n/a", "versions": [ { "status": "affected", "version": "2018,\u00a02017,\u00a02013, 2012, 2011" } ] } ], "descriptions": [ { "lang": "en", "value": "A malicious crafted dwf or .pct file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by read access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory corruption vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-21T00:00:00", "orgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "shortName": "autodesk" }, "references": [ { "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ] } }, "cveMetadata": { "assignerOrgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "assignerShortName": "autodesk", "cveId": "CVE-2022-42942", "datePublished": "2022-10-21T00:00:00", "dateReserved": "2022-10-14T00:00:00", "dateUpdated": "2024-08-03T13:19:05.528Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-42940
Vulnerability from cvelistv5
Published
2022-10-21 00:00
Modified
2024-08-03 13:19
Severity ?
EPSS score ?
Summary
A malicious crafted TGA file when consumed through DesignReview.exe application could lead to memory corruption vulnerability. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Autodesk Design Review |
Version: 2018, 2017, 2013, 2012, 2011 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:19:05.454Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Autodesk Design Review", "vendor": "n/a", "versions": [ { "status": "affected", "version": "2018,\u00a02017,\u00a02013, 2012, 2011" } ] } ], "descriptions": [ { "lang": "en", "value": "A malicious crafted TGA file when consumed through DesignReview.exe application could lead to memory corruption vulnerability. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory corruption vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-21T00:00:00", "orgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "shortName": "autodesk" }, "references": [ { "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ] } }, "cveMetadata": { "assignerOrgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "assignerShortName": "autodesk", "cveId": "CVE-2022-42940", "datePublished": "2022-10-21T00:00:00", "dateReserved": "2022-10-14T00:00:00", "dateUpdated": "2024-08-03T13:19:05.454Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-27039
Vulnerability from cvelistv5
Published
2021-07-09 14:18
Modified
2024-08-03 20:40
Severity ?
EPSS score ?
Summary
A maliciously crafted TIFF and PCX file can be forced to read and write beyond allocated boundaries when parsing the TIFF and PCX file for based overflow. This vulnerability can be exploited to execute arbitrary code.
References
▼ | URL | Tags |
---|---|---|
https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Autodesk Design Review |
Version: 2018, 2017, 2013, 2012, 2011 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:40:47.228Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Autodesk Design Review", "vendor": "n/a", "versions": [ { "status": "affected", "version": "2018,\u00a02017,\u00a02013, 2012, 2011" } ] } ], "descriptions": [ { "lang": "en", "value": "A maliciously crafted TIFF and PCX file can be forced to read and write beyond allocated boundaries when parsing the TIFF and PCX file for based overflow. This vulnerability can be exploited to execute arbitrary code." } ], "problemTypes": [ { "descriptions": [ { "description": "Uninitialized Variable Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-18T16:20:51", "orgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "shortName": "autodesk" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@autodesk.com", "ID": "CVE-2021-27039", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Autodesk Design Review", "version": { "version_data": [ { "version_value": "2018,\u00a02017,\u00a02013, 2012, 2011" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A maliciously crafted TIFF and PCX file can be forced to read and write beyond allocated boundaries when parsing the TIFF and PCX file for based overflow. This vulnerability can be exploited to execute arbitrary code." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Uninitialized Variable Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004", "refsource": "MISC", "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ] } } } }, "cveMetadata": { "assignerOrgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "assignerShortName": "autodesk", "cveId": "CVE-2021-27039", "datePublished": "2021-07-09T14:18:21", "dateReserved": "2021-02-09T00:00:00", "dateUpdated": "2024-08-03T20:40:47.228Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40160
Vulnerability from cvelistv5
Published
2021-12-23 18:31
Modified
2024-08-04 02:27
Severity ?
EPSS score ?
Summary
PDFTron prior to 9.0.7 version may be forced to read beyond allocated boundaries when parsing a maliciously crafted PDF file. This vulnerability can be exploited to execute arbitrary code.
References
▼ | URL | Tags |
---|---|---|
https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0010 | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.871Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0010" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Revit, Navisworks, Autodesk\u00ae Advance Steel, AutoCAD\u00ae, AutoCAD\u00ae Architecture, AutoCAD\u00ae Electrical, AutoCAD\u00ae Map 3D, AutoCAD\u00ae Mechanical, AutoCAD\u00ae MEP, AutoCAD\u00ae Plant 3D, AutoCAD\u00ae LT, Autodesk\u00ae Civil 3D, AutoCAD\u00ae Mac, AutoCAD\u00ae LT for Mac", "vendor": "n/a", "versions": [ { "status": "affected", "version": "prior to 9.0.7" } ] } ], "descriptions": [ { "lang": "en", "value": "PDFTron prior to 9.0.7 version may be forced to read beyond allocated boundaries when parsing a maliciously crafted PDF file. This vulnerability can be exploited to execute arbitrary code." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bound Read Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-18T16:20:48", "orgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "shortName": "autodesk" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0010" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@autodesk.com", "ID": "CVE-2021-40160", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Revit, Navisworks, Autodesk\u00ae Advance Steel, AutoCAD\u00ae, AutoCAD\u00ae Architecture, AutoCAD\u00ae Electrical, AutoCAD\u00ae Map 3D, AutoCAD\u00ae Mechanical, AutoCAD\u00ae MEP, AutoCAD\u00ae Plant 3D, AutoCAD\u00ae LT, Autodesk\u00ae Civil 3D, AutoCAD\u00ae Mac, AutoCAD\u00ae LT for Mac", "version": { "version_data": [ { "version_value": "prior to 9.0.7" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "PDFTron prior to 9.0.7 version may be forced to read beyond allocated boundaries when parsing a maliciously crafted PDF file. This vulnerability can be exploited to execute arbitrary code." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bound Read Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0010", "refsource": "MISC", "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0010" } ] } } } }, "cveMetadata": { "assignerOrgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "assignerShortName": "autodesk", "cveId": "CVE-2021-40160", "datePublished": "2021-12-23T18:31:31", "dateReserved": "2021-08-27T00:00:00", "dateUpdated": "2024-08-04T02:27:31.871Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-27033
Vulnerability from cvelistv5
Published
2021-07-09 14:12
Modified
2024-08-03 20:40
Severity ?
EPSS score ?
Summary
A Double Free vulnerability allows remote attackers to execute arbitrary code on PDF files within affected installations of Autodesk Design Review 2018, 2017, 2013, 2012, 2011. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
References
▼ | URL | Tags |
---|---|---|
https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Autodesk Design Review |
Version: 2018, 2017, 2013, 2012, 2011 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:40:47.208Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Autodesk Design Review", "vendor": "n/a", "versions": [ { "status": "affected", "version": "2018,\u00a02017,\u00a02013, 2012, 2011" } ] } ], "descriptions": [ { "lang": "en", "value": "A Double Free vulnerability allows remote attackers to execute arbitrary code on PDF files within affected installations of Autodesk Design Review 2018, 2017, 2013, 2012, 2011. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file." } ], "problemTypes": [ { "descriptions": [ { "description": "Double Free", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-18T16:20:48", "orgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "shortName": "autodesk" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@autodesk.com", "ID": "CVE-2021-27033", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Autodesk Design Review", "version": { "version_data": [ { "version_value": "2018,\u00a02017,\u00a02013, 2012, 2011" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A Double Free vulnerability allows remote attackers to execute arbitrary code on PDF files within affected installations of Autodesk Design Review 2018, 2017, 2013, 2012, 2011. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Double Free" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004", "refsource": "MISC", "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ] } } } }, "cveMetadata": { "assignerOrgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "assignerShortName": "autodesk", "cveId": "CVE-2021-27033", "datePublished": "2021-07-09T14:12:16", "dateReserved": "2021-02-09T00:00:00", "dateUpdated": "2024-08-03T20:40:47.208Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40167
Vulnerability from cvelistv5
Published
2022-01-25 19:11
Modified
2024-08-04 02:27
Severity ?
EPSS score ?
Summary
A malicious crafted dwf or .pct file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by read access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
References
▼ | URL | Tags |
---|---|---|
https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Autodesk® Design Review |
Version: 2018 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.853Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Autodesk\u00ae Design Review", "vendor": "n/a", "versions": [ { "status": "affected", "version": "2018" } ] } ], "descriptions": [ { "lang": "en", "value": "A malicious crafted dwf or .pct file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by read access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory Corruption", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-03T14:17:33", "orgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "shortName": "autodesk" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@autodesk.com", "ID": "CVE-2021-40167", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Autodesk\u00ae Design Review", "version": { "version_data": [ { "version_value": "2018" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A malicious crafted dwf or .pct file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by read access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory Corruption" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004", "refsource": "MISC", "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ] } } } }, "cveMetadata": { "assignerOrgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "assignerShortName": "autodesk", "cveId": "CVE-2021-40167", "datePublished": "2022-01-25T19:11:06", "dateReserved": "2021-08-27T00:00:00", "dateUpdated": "2024-08-04T02:27:31.853Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40164
Vulnerability from cvelistv5
Published
2022-10-07 00:00
Modified
2024-08-04 02:27
Severity ?
EPSS score ?
Summary
A heap-based buffer overflow could occur while parsing TIFF, PICT, TGA, or RLC files. This vulnerability may be exploited to execute arbitrary code.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Revit, Inventor, Infraworks, Navisworks, Fusion, Infrastructure Parts Editors, Autodesk Advanced Steel, Civil 3D, AutoCAD, AutoCAD LT, AutoCAD Architecture, AutoCAD Electrical, AutoCAD Map 3D, AutoCAD Mechanical, AutoCAD MEP, AutoCAD Plant 3D |
Version: 2022, 2021, 2020, 2019 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.502Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0011" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Revit, Inventor, Infraworks, Navisworks, Fusion, Infrastructure Parts Editors, Autodesk Advanced Steel, Civil 3D, AutoCAD, AutoCAD LT, AutoCAD Architecture, AutoCAD Electrical, AutoCAD Map 3D, AutoCAD Mechanical, AutoCAD MEP, AutoCAD Plant 3D", "vendor": "n/a", "versions": [ { "status": "affected", "version": "2022, 2021, 2020, 2019" } ] } ], "descriptions": [ { "lang": "en", "value": "A heap-based buffer overflow could occur while parsing TIFF, PICT, TGA, or RLC files. This vulnerability may be exploited to execute arbitrary code." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap-based Overflow", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-07T00:00:00", "orgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "shortName": "autodesk" }, "references": [ { "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0011" } ] } }, "cveMetadata": { "assignerOrgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "assignerShortName": "autodesk", "cveId": "CVE-2021-40164", "datePublished": "2022-10-07T00:00:00", "dateReserved": "2021-08-27T00:00:00", "dateUpdated": "2024-08-04T02:27:31.502Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-42935
Vulnerability from cvelistv5
Published
2022-10-21 00:00
Modified
2024-08-03 13:19
Severity ?
EPSS score ?
Summary
A malicious crafted .dwf or .pct file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Autodesk Design Review |
Version: 2018, 2017, 2013, 2012, 2011 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:19:05.503Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Autodesk Design Review", "vendor": "n/a", "versions": [ { "status": "affected", "version": "2018,\u00a02017,\u00a02013, 2012, 2011" } ] } ], "descriptions": [ { "lang": "en", "value": "A malicious crafted .dwf or .pct file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory corruption Read", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-21T00:00:00", "orgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "shortName": "autodesk" }, "references": [ { "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ] } }, "cveMetadata": { "assignerOrgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "assignerShortName": "autodesk", "cveId": "CVE-2022-42935", "datePublished": "2022-10-21T00:00:00", "dateReserved": "2022-10-14T00:00:00", "dateUpdated": "2024-08-03T13:19:05.503Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-27035
Vulnerability from cvelistv5
Published
2021-07-09 14:16
Modified
2024-08-03 20:40
Severity ?
EPSS score ?
Summary
A maliciously crafted TIFF, TIF, PICT, TGA, or DWF files in Autodesk Design Review 2018, 2017, 2013, 2012, 2011 can be forced to read beyond allocated boundaries when parsing the TIFF, PICT, TGA or DWF files. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
References
▼ | URL | Tags |
---|---|---|
https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Autodesk Design Review |
Version: 2018, 2017, 2013, 2012, 2011 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:40:47.068Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Autodesk Design Review", "vendor": "n/a", "versions": [ { "status": "affected", "version": "2018,\u00a02017,\u00a02013, 2012, 2011" } ] } ], "descriptions": [ { "lang": "en", "value": "A maliciously crafted TIFF, TIF, PICT, TGA, or DWF files in Autodesk Design Review 2018, 2017, 2013, 2012, 2011 can be forced to read beyond allocated boundaries when parsing the TIFF, PICT, TGA or DWF files. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds Read", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-18T16:20:49", "orgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "shortName": "autodesk" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@autodesk.com", "ID": "CVE-2021-27035", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Autodesk Design Review", "version": { "version_data": [ { "version_value": "2018,\u00a02017,\u00a02013, 2012, 2011" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A maliciously crafted TIFF, TIF, PICT, TGA, or DWF files in Autodesk Design Review 2018, 2017, 2013, 2012, 2011 can be forced to read beyond allocated boundaries when parsing the TIFF, PICT, TGA or DWF files. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Read" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004", "refsource": "MISC", "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ] } } } }, "cveMetadata": { "assignerOrgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "assignerShortName": "autodesk", "cveId": "CVE-2021-27035", "datePublished": "2021-07-09T14:16:34", "dateReserved": "2021-02-09T00:00:00", "dateUpdated": "2024-08-03T20:40:47.068Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-27865
Vulnerability from cvelistv5
Published
2022-07-29 19:01
Modified
2024-08-03 05:41
Severity ?
EPSS score ?
Summary
A maliciously crafted TGA or PCX file may be used to write beyond the allocated buffer through DesignReview.exe application while parsing TGA and PCX files. This vulnerability may be exploited to execute arbitrary code.
References
▼ | URL | Tags |
---|---|---|
https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0009 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Autodesk Design Review |
Version: 2018, 2017, 2013, 2012, 2011 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:41:10.400Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0009" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Autodesk Design Review", "vendor": "n/a", "versions": [ { "status": "affected", "version": "2018, 2017, 2013, 2012, 2011" } ] } ], "descriptions": [ { "lang": "en", "value": "A maliciously crafted TGA or PCX file may be used to write beyond the allocated buffer through DesignReview.exe application while parsing TGA and PCX files. This vulnerability may be exploited to execute arbitrary code." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bound read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-29T19:01:34", "orgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "shortName": "autodesk" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0009" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@autodesk.com", "ID": "CVE-2022-27865", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Autodesk Design Review", "version": { "version_data": [ { "version_value": "2018, 2017, 2013, 2012, 2011" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A maliciously crafted TGA or PCX file may be used to write beyond the allocated buffer through DesignReview.exe application while parsing TGA and PCX files. This vulnerability may be exploited to execute arbitrary code." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bound read vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0009", "refsource": "MISC", "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0009" } ] } } } }, "cveMetadata": { "assignerOrgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "assignerShortName": "autodesk", "cveId": "CVE-2022-27865", "datePublished": "2022-07-29T19:01:34", "dateReserved": "2022-03-25T00:00:00", "dateUpdated": "2024-08-03T05:41:10.400Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41306
Vulnerability from cvelistv5
Published
2022-10-14 00:00
Modified
2024-08-03 12:42
Severity ?
EPSS score ?
Summary
A maliciously crafted PCT file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Autodesk® Design Review |
Version: 2018 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:42:46.281Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0022" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Autodesk\u00ae Design Review", "vendor": "n/a", "versions": [ { "status": "affected", "version": "2018" } ] } ], "descriptions": [ { "lang": "en", "value": "A maliciously crafted PCT file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory corruption", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-14T00:00:00", "orgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "shortName": "autodesk" }, "references": [ { "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0022" } ] } }, "cveMetadata": { "assignerOrgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "assignerShortName": "autodesk", "cveId": "CVE-2022-41306", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-09-21T00:00:00", "dateUpdated": "2024-08-03T12:42:46.281Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-42944
Vulnerability from cvelistv5
Published
2022-10-21 00:00
Modified
2024-08-03 13:19
Severity ?
EPSS score ?
Summary
A malicious crafted dwf or .pct file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by read access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Autodesk Design Review |
Version: 2018, 2017, 2013, 2012, 2011 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:19:05.485Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Autodesk Design Review", "vendor": "n/a", "versions": [ { "status": "affected", "version": "2018,\u00a02017,\u00a02013, 2012, 2011" } ] } ], "descriptions": [ { "lang": "en", "value": "A malicious crafted dwf or .pct file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by read access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory corruption vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-21T00:00:00", "orgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "shortName": "autodesk" }, "references": [ { "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ] } }, "cveMetadata": { "assignerOrgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "assignerShortName": "autodesk", "cveId": "CVE-2022-42944", "datePublished": "2022-10-21T00:00:00", "dateReserved": "2022-10-14T00:00:00", "dateUpdated": "2024-08-03T13:19:05.485Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-27866
Vulnerability from cvelistv5
Published
2022-07-29 19:01
Modified
2024-08-03 05:41
Severity ?
EPSS score ?
Summary
A maliciously crafted TIFF file when consumed through DesignReview.exe application can be forced to read beyond allocated boundaries when parsing the TIFF file. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
References
▼ | URL | Tags |
---|---|---|
https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0009 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Autodesk Design Review |
Version: 2018, 2017, 2013, 2012, 2011 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:41:10.188Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0009" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Autodesk Design Review", "vendor": "n/a", "versions": [ { "status": "affected", "version": "2018, 2017, 2013, 2012, 2011" } ] } ], "descriptions": [ { "lang": "en", "value": "A maliciously crafted TIFF file when consumed through DesignReview.exe application can be forced to read beyond allocated boundaries when parsing the TIFF file. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bound write vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-29T19:01:44", "orgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "shortName": "autodesk" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0009" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@autodesk.com", "ID": "CVE-2022-27866", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Autodesk Design Review", "version": { "version_data": [ { "version_value": "2018, 2017, 2013, 2012, 2011" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A maliciously crafted TIFF file when consumed through DesignReview.exe application can be forced to read beyond allocated boundaries when parsing the TIFF file. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bound write vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0009", "refsource": "MISC", "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0009" } ] } } } }, "cveMetadata": { "assignerOrgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "assignerShortName": "autodesk", "cveId": "CVE-2022-27866", "datePublished": "2022-07-29T19:01:44", "dateReserved": "2022-03-25T00:00:00", "dateUpdated": "2024-08-03T05:41:10.188Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-42941
Vulnerability from cvelistv5
Published
2022-10-21 00:00
Modified
2024-08-03 13:19
Severity ?
EPSS score ?
Summary
A malicious crafted dwf or .pct file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by read access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Autodesk Design Review |
Version: 2018, 2017, 2013, 2012, 2011 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T13:19:05.516Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Autodesk Design Review", "vendor": "n/a", "versions": [ { "status": "affected", "version": "2018,\u00a02017,\u00a02013, 2012, 2011" } ] } ], "descriptions": [ { "lang": "en", "value": "A malicious crafted dwf or .pct file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by read access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory corruption vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-21T00:00:00", "orgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "shortName": "autodesk" }, "references": [ { "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ] } }, "cveMetadata": { "assignerOrgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "assignerShortName": "autodesk", "cveId": "CVE-2022-42941", "datePublished": "2022-10-21T00:00:00", "dateReserved": "2022-10-14T00:00:00", "dateUpdated": "2024-08-03T13:19:05.516Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40166
Vulnerability from cvelistv5
Published
2022-10-07 00:00
Modified
2024-08-04 02:27
Severity ?
EPSS score ?
Summary
A maliciously crafted PNG file in Autodesk Image Processing component may be used to attempt to free an object that has already been freed while parsing them. This vulnerability may be exploited by attackers to execute arbitrary code.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Revit, Inventor, Infraworks, Navisworks, Fusion, Infrastructure Parts Editors, Autodesk Advanced Steel, Civil 3D, AutoCAD, AutoCAD LT, AutoCAD Architecture, AutoCAD Electrical, AutoCAD Map 3D, AutoCAD Mechanical, AutoCAD MEP, AutoCAD Plant 3D |
Version: 2022, 2021, 2020, 2019 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.562Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0011" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Revit, Inventor, Infraworks, Navisworks, Fusion, Infrastructure Parts Editors, Autodesk Advanced Steel, Civil 3D, AutoCAD, AutoCAD LT, AutoCAD Architecture, AutoCAD Electrical, AutoCAD Map 3D, AutoCAD Mechanical, AutoCAD MEP, AutoCAD Plant 3D", "vendor": "n/a", "versions": [ { "status": "affected", "version": "2022, 2021, 2020, 2019" } ] } ], "descriptions": [ { "lang": "en", "value": "A maliciously crafted PNG file in Autodesk Image Processing component may be used to attempt to free an object that has already been freed while parsing them. This vulnerability may be exploited by attackers to execute arbitrary code." } ], "problemTypes": [ { "descriptions": [ { "description": "Use-After-Free", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-07T00:00:00", "orgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "shortName": "autodesk" }, "references": [ { "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0011" } ] } }, "cveMetadata": { "assignerOrgId": "7e40ea87-bc65-4944-9723-dd79dd760601", "assignerShortName": "autodesk", "cveId": "CVE-2021-40166", "datePublished": "2022-10-07T00:00:00", "dateReserved": "2021-08-27T00:00:00", "dateUpdated": "2024-08-04T02:27:31.562Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2021-12-23 19:15
Modified
2024-11-21 06:23
Severity ?
Summary
PDFTron prior to 9.0.7 version may be forced to read beyond allocated boundaries when parsing a maliciously crafted PDF file. This vulnerability can be exploited to execute arbitrary code.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@autodesk.com | https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0010 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0010 | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
autodesk | revit | * | |
autodesk | revit | * | |
autodesk | revit | * | |
autodesk | navisworks | * | |
autodesk | navisworks | * | |
autodesk | navisworks | * | |
autodesk | navisworks | * | |
autodesk | advance_steel | * | |
autodesk | autocad | * | |
autodesk | autocad | * | |
autodesk | autocad_architecture | * | |
autodesk | autocad_electrical | * | |
autodesk | autocad_lt | * | |
autodesk | autocad_lt | * | |
autodesk | autocad_map_3d | * | |
autodesk | autocad_mechanical | * | |
autodesk | autocad_mep | * | |
autodesk | autocad_plant_3d | * | |
autodesk | civil_3d | * | |
autodesk | design_review | 2018 | |
autodesk | design_review | 2018 | |
autodesk | design_review | 2018 | |
autodesk | design_review | 2018 | |
autodesk | design_review | 2018 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:*", "matchCriteriaId": "6DCAF9B0-8B1F-4625-B04F-DECB699C9770", "versionEndExcluding": "2020.2.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:*", "matchCriteriaId": "A9BBB8FC-C689-4DF6-B79D-248C0144A5EC", "versionEndExcluding": "2021.1.4", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:*", "matchCriteriaId": "A29624C7-516C-4E7E-B1FE-43ED3188BC70", "versionEndExcluding": "2022.1", "versionStartIncluding": "2022", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autodesk:navisworks:*:*:*:*:*:*:*:*", "matchCriteriaId": "70EC1A64-F7DD-4835-969F-A9051F06CB60", "versionEndExcluding": "2019.6", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:navisworks:*:*:*:*:*:*:*:*", "matchCriteriaId": "FB5C1908-9829-46DE-881F-57277490BE71", "versionEndExcluding": "2020.4", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:navisworks:*:*:*:*:*:*:*:*", "matchCriteriaId": "AE821566-76A8-43D6-9628-B82CFE9FAC19", "versionEndExcluding": "2021.3", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:navisworks:*:*:*:*:*:*:*:*", "matchCriteriaId": "CE0E4388-28DB-4D72-BA69-882A121C8C9A", "versionEndExcluding": "2022.1", "versionStartIncluding": "2022", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:*", "matchCriteriaId": "67E62F6D-C9D2-4129-A25A-468F150BA2CB", "versionEndExcluding": "2022.1.1", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*", "matchCriteriaId": "4104E0A8-E133-41F9-A60A-368FD2DCC1A3", "versionEndExcluding": "2022.1.1", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:macos:*:*", "matchCriteriaId": "F7B0B566-F23E-4637-8611-8D055A90F421", "versionEndExcluding": "2022.2", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*", "matchCriteriaId": "D42D33AA-39DC-4B60-A87F-2B9A41390EDA", "versionEndExcluding": "2022.1.1", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2D4CB47-D77A-4ACA-A606-3E7880729E0C", "versionEndExcluding": "2022.1.1", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:*:*:*", "matchCriteriaId": "E813870A-AAB5-491F-8ECA-587432AD9935", "versionEndExcluding": "2022.1.1", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:macos:*:*", "matchCriteriaId": "FF16B57E-C704-43BE-94F5-F09493257323", "versionEndExcluding": "2022.2", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "1172D845-0F80-45EC-95D6-911556D4032D", "versionEndExcluding": "2022.1.1", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*", "matchCriteriaId": "047BD11C-74A7-47AA-A593-BAACD00D2B89", "versionEndExcluding": "2022.1.1", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*", "matchCriteriaId": "C926403A-E06B-45A7-9693-CF0B78C7C627", "versionEndExcluding": "2022.1.1", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "C3807591-D6E0-4BB6-9573-C318A9D4EF60", "versionEndExcluding": "2022.1.1", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4C8F3C7-F830-4138-99BD-064F969E4929", "versionEndExcluding": "2022.1.1", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:-:*:*:*:*:*:*", "matchCriteriaId": "213232B9-A40B-436D-A66A-B65C49D59BE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix:*:*:*:*:*:*", "matchCriteriaId": "2D0CF4DC-ACA5-41D0-B28E-CEB5D2C96F71", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix2:*:*:*:*:*:*", "matchCriteriaId": "84ED1789-A17F-48F7-A152-09D2A5C59254", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix3:*:*:*:*:*:*", "matchCriteriaId": "74819924-EB63-4BBF-9986-FEF6100EEE15", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix4:*:*:*:*:*:*", "matchCriteriaId": "100922EF-C773-4798-B352-B16FCAD48F36", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "PDFTron prior to 9.0.7 version may be forced to read beyond allocated boundaries when parsing a maliciously crafted PDF file. This vulnerability can be exploited to execute arbitrary code." }, { "lang": "es", "value": "PDFTron antes de la versi\u00f3n 9.0.7 puede ser forzado a leer m\u00e1s all\u00e1 de los l\u00edmites asignados al analizar un archivo PDF malicioso. Esta vulnerabilidad puede ser explotada para ejecutar c\u00f3digo arbitrario" } ], "id": "CVE-2021-40160", "lastModified": "2024-11-21T06:23:41.700", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-12-23T19:15:12.117", "references": [ { "source": "psirt@autodesk.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0010" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0010" } ], "sourceIdentifier": "psirt@autodesk.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-07-29 20:15
Modified
2024-11-21 06:56
Severity ?
Summary
A Double Free vulnerability allows remote attackers to execute arbitrary code through DesignReview.exe application on PDF files within affected installations. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@autodesk.com | https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0009 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0009 | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
autodesk | design_review | 2011 | |
autodesk | design_review | 2012 | |
autodesk | design_review | 2013 | |
autodesk | design_review | 2017 | |
autodesk | design_review | 2018 | |
autodesk | design_review | 2018 | |
autodesk | design_review | 2018 | |
autodesk | design_review | 2018 | |
autodesk | design_review | 2018 | |
autodesk | design_review | 2018 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autodesk:design_review:2011:-:*:*:*:*:*:*", "matchCriteriaId": "8E86021D-C654-4DC3-9D68-E64057566ABB", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2012:-:*:*:*:*:*:*", "matchCriteriaId": "D03EA125-FDF2-4A27-A020-0AC6E5F9C15E", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2013:-:*:*:*:*:*:*", "matchCriteriaId": "BCF10ED6-1D50-483D-9E03-9172D5CF24FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2017:-:*:*:*:*:*:*", "matchCriteriaId": "76C839AD-A4B3-4534-A7A8-17EBD59586E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:-:*:*:*:*:*:*", "matchCriteriaId": "213232B9-A40B-436D-A66A-B65C49D59BE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix:*:*:*:*:*:*", "matchCriteriaId": "2D0CF4DC-ACA5-41D0-B28E-CEB5D2C96F71", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix2:*:*:*:*:*:*", "matchCriteriaId": "84ED1789-A17F-48F7-A152-09D2A5C59254", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix3:*:*:*:*:*:*", "matchCriteriaId": "74819924-EB63-4BBF-9986-FEF6100EEE15", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix4:*:*:*:*:*:*", "matchCriteriaId": "100922EF-C773-4798-B352-B16FCAD48F36", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix5:*:*:*:*:*:*", "matchCriteriaId": "1C7E8CE3-8A75-4357-8722-17E2CE2378CC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Double Free vulnerability allows remote attackers to execute arbitrary code through DesignReview.exe application on PDF files within affected installations. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file." }, { "lang": "es", "value": "Una vulnerabilidad de Doble Liberaci\u00f3n permite a atacantes remotos ejecutar c\u00f3digo arbitrario mediante la aplicaci\u00f3n DesignReview.exe en archivos PDF dentro de las instalaciones afectadas. Es requerida una interacci\u00f3n del usuario para explotar esta vulnerabilidad, ya que el objetivo debe visitar una p\u00e1gina maliciosa o abrir un archivo malicioso" } ], "id": "CVE-2022-27864", "lastModified": "2024-11-21T06:56:21.373", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-07-29T20:15:12.160", "references": [ { "source": "psirt@autodesk.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0009" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0009" } ], "sourceIdentifier": "psirt@autodesk.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-415" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-10-21 16:15
Modified
2024-11-21 07:25
Severity ?
Summary
A malicious crafted .dwf or .pct file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@autodesk.com | https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004 | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
autodesk | autocad | 2019 | |
autodesk | autocad | 2020 | |
autodesk | autocad | 2021 | |
autodesk | autocad | 2022 | |
autodesk | autocad | 2022 | |
autodesk | autocad | 2023 | |
autodesk | autocad_advance_steel | 2019 | |
autodesk | autocad_advance_steel | 2020 | |
autodesk | autocad_advance_steel | 2021 | |
autodesk | autocad_advance_steel | 2022 | |
autodesk | autocad_advance_steel | 2023 | |
autodesk | autocad_architecture | 2019 | |
autodesk | autocad_architecture | 2020 | |
autodesk | autocad_architecture | 2021 | |
autodesk | autocad_architecture | 2022 | |
autodesk | autocad_architecture | 2023 | |
autodesk | autocad_civil_3d | 2019 | |
autodesk | autocad_civil_3d | 2020 | |
autodesk | autocad_civil_3d | 2021 | |
autodesk | autocad_civil_3d | 2022 | |
autodesk | autocad_civil_3d | 2023 | |
autodesk | autocad_electrical | 2019 | |
autodesk | autocad_electrical | 2020 | |
autodesk | autocad_electrical | 2021 | |
autodesk | autocad_electrical | 2022 | |
autodesk | autocad_electrical | 2023 | |
autodesk | autocad_lt | 2019 | |
autodesk | autocad_lt | 2020 | |
autodesk | autocad_lt | 2021 | |
autodesk | autocad_lt | 2022 | |
autodesk | autocad_lt | 2022 | |
autodesk | autocad_lt | 2023 | |
autodesk | autocad_map_3d | 2019 | |
autodesk | autocad_map_3d | 2020 | |
autodesk | autocad_map_3d | 2021 | |
autodesk | autocad_map_3d | 2022 | |
autodesk | autocad_map_3d | 2023 | |
autodesk | autocad_mechanical | 2019 | |
autodesk | autocad_mechanical | 2020 | |
autodesk | autocad_mechanical | 2021 | |
autodesk | autocad_mechanical | 2022 | |
autodesk | autocad_mechanical | 2023 | |
autodesk | autocad_mep | 2019 | |
autodesk | autocad_mep | 2020 | |
autodesk | autocad_mep | 2021 | |
autodesk | autocad_mep | 2022 | |
autodesk | autocad_mep | 2023 | |
autodesk | autocad_plant_3d | 2019 | |
autodesk | autocad_plant_3d | 2020 | |
autodesk | autocad_plant_3d | 2021 | |
autodesk | autocad_plant_3d | 2022 | |
autodesk | autocad_plant_3d | 2023 | |
autodesk | design_review | 2018 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autodesk:autocad:2019:*:*:*:*:*:*:*", "matchCriteriaId": "411DC826-735A-4BEB-84BE-9250F97F612E", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2020:*:*:*:*:*:*:*", "matchCriteriaId": "E30E2562-D38E-4764-874E-5B2FCF5639E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2021:*:*:*:*:*:*:*", "matchCriteriaId": "88B2C295-D091-4C1D-8285-4309967707BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2022:*:*:*:*:*:*:*", "matchCriteriaId": "EACE09F2-A323-4E4B-9A35-4EBAE3864E6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2022:*:*:*:*:macos:*:*", "matchCriteriaId": "68FC54D1-B4FC-404E-9742-72F8340FE3C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2023:*:*:*:*:*:*:*", "matchCriteriaId": "2241C287-9396-4AD8-B93C-3596394AB2D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:2019:*:*:*:*:*:*:*", "matchCriteriaId": "9B1CAD53-7C63-4E5D-BD2E-364A7A87AA1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:2020:*:*:*:*:*:*:*", "matchCriteriaId": "127F5A79-8E66-4ABD-8D88-8891C6D670D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:2021:*:*:*:*:*:*:*", "matchCriteriaId": "37D8982C-E506-4988-AA97-BDF1B1C3D71A", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:2022:*:*:*:*:*:*:*", "matchCriteriaId": "002AC200-6AE2-4817-91D3-957DA3AC9787", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:2023:*:*:*:*:*:*:*", "matchCriteriaId": "E881C720-E487-463E-A364-A1F9EC3C1D24", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2019:*:*:*:*:*:*:*", "matchCriteriaId": "9275E76C-2A79-462A-A9D3-D0B6BBCDD0CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2020:*:*:*:*:*:*:*", "matchCriteriaId": "B7DFA12E-48C5-47B9-BD9F-1AFACBF4E1EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2021:*:*:*:*:*:*:*", "matchCriteriaId": "535A5D39-1C82-4301-9E5B-C9E0D75F38B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2022:*:*:*:*:*:*:*", "matchCriteriaId": "316615EC-BC9F-4B6A-8163-EBECC480EFDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2023:*:*:*:*:*:*:*", "matchCriteriaId": "546AFB2D-F78A-40C2-AC55-7D07EF0BDC7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2019:*:*:*:*:*:*:*", "matchCriteriaId": "AB3A878B-2142-404F-BCF4-BB508674C6C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2020:*:*:*:*:*:*:*", "matchCriteriaId": "64F2EC88-168D-4DD1-9ADA-3F9FA60D6E35", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2021:*:*:*:*:*:*:*", "matchCriteriaId": "5D73C803-7567-4C1D-B62A-C3C52369022D", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2022:*:*:*:*:*:*:*", "matchCriteriaId": "C5F77B03-3221-4564-B4FF-7BF7EEC1C5B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2023:*:*:*:*:*:*:*", "matchCriteriaId": "C6E001C0-0D7B-44ED-BBE8-E6635C45F988", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2019:*:*:*:*:*:*:*", "matchCriteriaId": "A10DE5AF-1718-4899-9238-CFFDC72D05B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2020:*:*:*:*:*:*:*", "matchCriteriaId": "E388264D-D2D4-4BE4-9097-8F547D73ABE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2021:*:*:*:*:*:*:*", "matchCriteriaId": "16611BAA-C200-4C8B-823F-1AB95F5E1317", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2022:*:*:*:*:*:*:*", "matchCriteriaId": "E2DC5114-48D2-4D85-8E80-B4BCB0FD78F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2023:*:*:*:*:*:*:*", "matchCriteriaId": "A2949D87-C1FA-43C3-8F1F-08ED7A64F302", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2019:*:*:*:*:*:*:*", "matchCriteriaId": "03682B7E-1CF1-4456-A51F-A6ADFC177935", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2020:*:*:*:*:*:*:*", "matchCriteriaId": "371C5F60-4959-40C7-93E1-A01510A95115", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2021:*:*:*:*:*:*:*", "matchCriteriaId": "D83FB4C7-B374-4907-8E2B-EEE61C8339E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2022:*:*:*:*:*:*:*", "matchCriteriaId": "601676EC-2EB4-45D0-B1AE-0980CBD68770", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2022:*:*:*:*:macos:*:*", "matchCriteriaId": "4A2EF334-E4E2-40DA-BD51-B74EE1E0ACCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2023:*:*:*:*:*:*:*", "matchCriteriaId": "99924DDE-3D49-4D37-A361-69B28E7B94A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2019:*:*:*:*:*:*:*", "matchCriteriaId": "04E05510-B21B-4DDD-88D7-CEB8963E1AFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2020:*:*:*:*:*:*:*", "matchCriteriaId": "D4CD010A-FDBC-40F9-95AC-0CD8388B85D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2021:*:*:*:*:*:*:*", "matchCriteriaId": "FC99E0F3-AA11-4390-A7C0-5BBFCDA94E3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2022:*:*:*:*:*:*:*", "matchCriteriaId": "33AA60CF-611C-45FC-92F8-7517D87B1645", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2023:*:*:*:*:*:*:*", "matchCriteriaId": "15A36E1F-964C-4DF2-91D1-D37ECEFC1C86", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2019:*:*:*:*:*:*:*", "matchCriteriaId": "19255CEC-6161-4D44-B87E-52E86DF4FBA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2020:*:*:*:*:*:*:*", "matchCriteriaId": "7147F378-DFB0-48A8-8B05-8777E1CC7F90", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2021:*:*:*:*:*:*:*", "matchCriteriaId": "3B5C858C-4A01-4916-BE3E-B9056D67CF5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2022:*:*:*:*:*:*:*", "matchCriteriaId": "7EB83A4A-D4C2-4509-BD49-15B9BBC7BF97", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2023:*:*:*:*:*:*:*", "matchCriteriaId": "DCF7910A-432F-419E-96E0-25D638A6F298", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2019:*:*:*:*:*:*:*", "matchCriteriaId": "3F608B1C-BA96-4EA8-A540-83870262CBC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2020:*:*:*:*:*:*:*", "matchCriteriaId": "7CFAAD19-6248-42CB-B177-EC2E5141A953", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2021:*:*:*:*:*:*:*", "matchCriteriaId": "1C52D90B-578B-4281-BF0E-B7CDA425ED05", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2022:*:*:*:*:*:*:*", "matchCriteriaId": "4C8AD4F3-AA82-49F5-A18A-85127FDB8B95", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2023:*:*:*:*:*:*:*", "matchCriteriaId": "DF8D9BA5-A043-42DB-A524-6728D3BF2B90", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2019:*:*:*:*:*:*:*", "matchCriteriaId": "4E536B0D-4C95-4589-981A-2F8A6C4B44DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2020:*:*:*:*:*:*:*", "matchCriteriaId": "3FBDD3AC-FA00-462F-AA13-5A75B5D50689", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2021:*:*:*:*:*:*:*", "matchCriteriaId": "73E2E9E8-2269-4729-8D8F-3C26974F5FD2", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2022:*:*:*:*:*:*:*", "matchCriteriaId": "452A1A75-C59A-43AB-9C43-BA49EB95C39C", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2023:*:*:*:*:*:*:*", "matchCriteriaId": "07CB7F37-E6D4-40F3-85BA-EC060E923505", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:-:*:*:*:*:*:*", "matchCriteriaId": "213232B9-A40B-436D-A66A-B65C49D59BE6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A malicious crafted .dwf or .pct file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process." }, { "lang": "es", "value": "Un archivo .dwf o .pct dise\u00f1ado de forma maliciosa cuando es consumido mediante la aplicaci\u00f3n DesignReview.exe podr\u00eda conllevar a una vulnerabilidad de corrupci\u00f3n de memoria por violaci\u00f3n de acceso de escritura. Esta vulnerabilidad, junto con otras, podr\u00eda conllevar a una ejecuci\u00f3n de c\u00f3digo en el contexto del proceso actual" } ], "id": "CVE-2022-42936", "lastModified": "2024-11-21T07:25:37.803", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-10-21T16:15:11.737", "references": [ { "source": "psirt@autodesk.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ], "sourceIdentifier": "psirt@autodesk.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-10-03 15:15
Modified
2024-11-21 07:08
Severity ?
Summary
A maliciously crafted GIF or JPEG files when parsed through Autodesk Design Review 2018, and AutoCAD 2023 and 2022 could be used to write beyond the allocated heap buffer. This vulnerability could lead to arbitrary code execution.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
autodesk | autocad | * | |
autodesk | autocad | * | |
autodesk | autocad_advance_steel | * | |
autodesk | autocad_advance_steel | * | |
autodesk | autocad_architecture | * | |
autodesk | autocad_architecture | * | |
autodesk | autocad_civil_3d | * | |
autodesk | autocad_civil_3d | * | |
autodesk | autocad_electrical | * | |
autodesk | autocad_electrical | * | |
autodesk | autocad_lt | * | |
autodesk | autocad_lt | * | |
autodesk | autocad_map_3d | * | |
autodesk | autocad_map_3d | * | |
autodesk | autocad_mechanical | * | |
autodesk | autocad_mechanical | * | |
autodesk | autocad_mep | * | |
autodesk | autocad_mep | * | |
autodesk | autocad_plant_3d | * | |
autodesk | autocad_plant_3d | * | |
autodesk | design_review | * | |
autodesk | design_review | 2018 | |
autodesk | design_review | 2018 | |
autodesk | design_review | 2018 | |
autodesk | design_review | 2018 | |
autodesk | design_review | 2018 | |
autodesk | design_review | 2018 | |
autodesk | design_review | 2018 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*", "matchCriteriaId": "F867A29B-ABEA-40D8-9252-9129DBC4EEEC", "versionEndExcluding": "2022.1.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*", "matchCriteriaId": "480910B3-5FD0-47EF-98BA-FDFE22945BB0", "versionEndExcluding": "2023.1.1", "versionStartIncluding": "2023.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:*:*:*:*:*:*:*:*", "matchCriteriaId": "354E7B7A-22BA-4EB2-B136-9622A8032167", "versionEndExcluding": "2022.1.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:*:*:*:*:*:*:*:*", "matchCriteriaId": "91A206DF-6922-4CF8-9481-E6A4A2953753", "versionEndExcluding": "2023.1.1", "versionStartIncluding": "2023.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*", "matchCriteriaId": "B0381CFD-48B1-4BA4-9961-64544267F852", "versionEndExcluding": "2022.1.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*", "matchCriteriaId": "729710F9-F4F9-4466-8FA2-22A0C0CF9420", "versionEndExcluding": "2023.1.1", "versionStartIncluding": "2023.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "3CEE7EBE-109D-43EC-9411-8169E589670A", "versionEndExcluding": "2022.1.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "F1C62E65-FD27-478A-A472-FBDA4C751BB5", "versionEndExcluding": "2023.1.1", "versionStartIncluding": "2023.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*", "matchCriteriaId": "AF33C631-4C2E-4A18-B5E8-A2037BF29196", "versionEndExcluding": "2022.1.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*", "matchCriteriaId": "F1A13743-F25B-47BC-902A-E7ADB9ACA577", "versionEndExcluding": "2023.1.1", "versionStartIncluding": "2023.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:*:*:*", "matchCriteriaId": "42E5B8D3-9B23-4DC0-B7CE-BB7EC8D981F0", "versionEndExcluding": "2022.1.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:*:*:*", "matchCriteriaId": "20E3E3AA-051D-44E2-BD4A-8EBFCFD11C8C", "versionEndExcluding": "2023.1.1", "versionStartIncluding": "2023.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "2ACB4E3C-FE40-4416-8484-A3A3B6883286", "versionEndExcluding": "2022.1.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA7C36AC-ED97-4669-AD61-75AA00F0385C", "versionEndExcluding": "2023.1.1", "versionStartIncluding": "2023.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*", "matchCriteriaId": "E3107206-44ED-45CB-A218-AC8E12CD4409", "versionEndExcluding": "2022.1.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*", "matchCriteriaId": "1F4ADAD1-5627-4BD2-A72B-DEC95415261F", "versionEndExcluding": "2023.1.1", "versionStartIncluding": "2023.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*", "matchCriteriaId": "C3357899-6803-4D09-94F0-7A633DB05E85", "versionEndExcluding": "2022.1.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*", "matchCriteriaId": "7FDA3E45-B980-4715-80CC-C29B4A3900C3", "versionEndExcluding": "2023.1.1", "versionStartIncluding": "2023.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "9AC1E832-B725-4F72-812F-000ADE262DEA", "versionEndExcluding": "2022.1.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "0A20490C-CDFD-4FCE-B5E3-1F2F78A0C531", "versionEndExcluding": "2023.1.1", "versionStartIncluding": "2023.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:*:*:*:*:*:*:*:*", "matchCriteriaId": "376B6A4F-8AF5-4D6E-B39C-2E99F7A81BCD", "versionEndExcluding": "2018", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:-:*:*:*:*:*:*", "matchCriteriaId": "213232B9-A40B-436D-A66A-B65C49D59BE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix:*:*:*:*:*:*", "matchCriteriaId": "2D0CF4DC-ACA5-41D0-B28E-CEB5D2C96F71", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix2:*:*:*:*:*:*", "matchCriteriaId": "84ED1789-A17F-48F7-A152-09D2A5C59254", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix3:*:*:*:*:*:*", "matchCriteriaId": "74819924-EB63-4BBF-9986-FEF6100EEE15", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix4:*:*:*:*:*:*", "matchCriteriaId": "100922EF-C773-4798-B352-B16FCAD48F36", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix5:*:*:*:*:*:*", "matchCriteriaId": "1C7E8CE3-8A75-4357-8722-17E2CE2378CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix6:*:*:*:*:*:*", "matchCriteriaId": "41A96F19-544E-471F-B6BF-9CC8E9403A2A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A maliciously crafted GIF or JPEG files when parsed through Autodesk Design Review 2018, and AutoCAD 2023 and 2022 could be used to write beyond the allocated heap buffer. This vulnerability could lead to arbitrary code execution." }, { "lang": "es", "value": "Un archivo GIF o JPEG dise\u00f1ado de forma maliciosa cuando es analizado mediante Autodesk Design Review versi\u00f3n 2018 y AutoCAD versiones 2023 y 2022, podr\u00eda usarse para escribir m\u00e1s all\u00e1 del b\u00fafer de la pila asignado. Esta vulnerabilidad podr\u00eda conllevar a una ejecuci\u00f3n de c\u00f3digo arbitrario" } ], "id": "CVE-2022-33889", "lastModified": "2024-11-21T07:08:32.230", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-10-03T15:15:17.633", "references": [ { "source": "psirt@autodesk.com", "tags": [ "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0021" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0021" } ], "sourceIdentifier": "psirt@autodesk.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-10-21 16:15
Modified
2024-11-21 07:25
Severity ?
Summary
A malicious crafted dwf or .pct file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by read access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@autodesk.com | https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004 | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
autodesk | autocad | 2019 | |
autodesk | autocad | 2020 | |
autodesk | autocad | 2021 | |
autodesk | autocad | 2022 | |
autodesk | autocad | 2022 | |
autodesk | autocad | 2023 | |
autodesk | autocad_advance_steel | 2019 | |
autodesk | autocad_advance_steel | 2020 | |
autodesk | autocad_advance_steel | 2021 | |
autodesk | autocad_advance_steel | 2022 | |
autodesk | autocad_advance_steel | 2023 | |
autodesk | autocad_architecture | 2019 | |
autodesk | autocad_architecture | 2020 | |
autodesk | autocad_architecture | 2021 | |
autodesk | autocad_architecture | 2022 | |
autodesk | autocad_architecture | 2023 | |
autodesk | autocad_civil_3d | 2019 | |
autodesk | autocad_civil_3d | 2020 | |
autodesk | autocad_civil_3d | 2021 | |
autodesk | autocad_civil_3d | 2022 | |
autodesk | autocad_civil_3d | 2023 | |
autodesk | autocad_electrical | 2019 | |
autodesk | autocad_electrical | 2020 | |
autodesk | autocad_electrical | 2021 | |
autodesk | autocad_electrical | 2022 | |
autodesk | autocad_electrical | 2023 | |
autodesk | autocad_lt | 2019 | |
autodesk | autocad_lt | 2020 | |
autodesk | autocad_lt | 2021 | |
autodesk | autocad_lt | 2022 | |
autodesk | autocad_lt | 2022 | |
autodesk | autocad_lt | 2023 | |
autodesk | autocad_map_3d | 2019 | |
autodesk | autocad_map_3d | 2020 | |
autodesk | autocad_map_3d | 2021 | |
autodesk | autocad_map_3d | 2022 | |
autodesk | autocad_map_3d | 2023 | |
autodesk | autocad_mechanical | 2019 | |
autodesk | autocad_mechanical | 2020 | |
autodesk | autocad_mechanical | 2021 | |
autodesk | autocad_mechanical | 2022 | |
autodesk | autocad_mechanical | 2023 | |
autodesk | autocad_mep | 2019 | |
autodesk | autocad_mep | 2020 | |
autodesk | autocad_mep | 2021 | |
autodesk | autocad_mep | 2022 | |
autodesk | autocad_mep | 2023 | |
autodesk | autocad_plant_3d | 2019 | |
autodesk | autocad_plant_3d | 2020 | |
autodesk | autocad_plant_3d | 2021 | |
autodesk | autocad_plant_3d | 2022 | |
autodesk | autocad_plant_3d | 2023 | |
autodesk | design_review | 2018 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autodesk:autocad:2019:*:*:*:*:*:*:*", "matchCriteriaId": "411DC826-735A-4BEB-84BE-9250F97F612E", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2020:*:*:*:*:*:*:*", "matchCriteriaId": "E30E2562-D38E-4764-874E-5B2FCF5639E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2021:*:*:*:*:*:*:*", "matchCriteriaId": "88B2C295-D091-4C1D-8285-4309967707BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2022:*:*:*:*:*:*:*", "matchCriteriaId": "EACE09F2-A323-4E4B-9A35-4EBAE3864E6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2022:*:*:*:*:macos:*:*", "matchCriteriaId": "68FC54D1-B4FC-404E-9742-72F8340FE3C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2023:*:*:*:*:*:*:*", "matchCriteriaId": "2241C287-9396-4AD8-B93C-3596394AB2D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:2019:*:*:*:*:*:*:*", "matchCriteriaId": "9B1CAD53-7C63-4E5D-BD2E-364A7A87AA1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:2020:*:*:*:*:*:*:*", "matchCriteriaId": "127F5A79-8E66-4ABD-8D88-8891C6D670D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:2021:*:*:*:*:*:*:*", "matchCriteriaId": "37D8982C-E506-4988-AA97-BDF1B1C3D71A", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:2022:*:*:*:*:*:*:*", "matchCriteriaId": "002AC200-6AE2-4817-91D3-957DA3AC9787", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:2023:*:*:*:*:*:*:*", "matchCriteriaId": "E881C720-E487-463E-A364-A1F9EC3C1D24", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2019:*:*:*:*:*:*:*", "matchCriteriaId": "9275E76C-2A79-462A-A9D3-D0B6BBCDD0CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2020:*:*:*:*:*:*:*", "matchCriteriaId": "B7DFA12E-48C5-47B9-BD9F-1AFACBF4E1EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2021:*:*:*:*:*:*:*", "matchCriteriaId": "535A5D39-1C82-4301-9E5B-C9E0D75F38B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2022:*:*:*:*:*:*:*", "matchCriteriaId": "316615EC-BC9F-4B6A-8163-EBECC480EFDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2023:*:*:*:*:*:*:*", "matchCriteriaId": "546AFB2D-F78A-40C2-AC55-7D07EF0BDC7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2019:*:*:*:*:*:*:*", "matchCriteriaId": "AB3A878B-2142-404F-BCF4-BB508674C6C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2020:*:*:*:*:*:*:*", "matchCriteriaId": "64F2EC88-168D-4DD1-9ADA-3F9FA60D6E35", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2021:*:*:*:*:*:*:*", "matchCriteriaId": "5D73C803-7567-4C1D-B62A-C3C52369022D", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2022:*:*:*:*:*:*:*", "matchCriteriaId": "C5F77B03-3221-4564-B4FF-7BF7EEC1C5B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2023:*:*:*:*:*:*:*", "matchCriteriaId": "C6E001C0-0D7B-44ED-BBE8-E6635C45F988", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2019:*:*:*:*:*:*:*", "matchCriteriaId": "A10DE5AF-1718-4899-9238-CFFDC72D05B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2020:*:*:*:*:*:*:*", "matchCriteriaId": "E388264D-D2D4-4BE4-9097-8F547D73ABE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2021:*:*:*:*:*:*:*", "matchCriteriaId": "16611BAA-C200-4C8B-823F-1AB95F5E1317", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2022:*:*:*:*:*:*:*", "matchCriteriaId": "E2DC5114-48D2-4D85-8E80-B4BCB0FD78F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2023:*:*:*:*:*:*:*", "matchCriteriaId": "A2949D87-C1FA-43C3-8F1F-08ED7A64F302", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2019:*:*:*:*:*:*:*", "matchCriteriaId": "03682B7E-1CF1-4456-A51F-A6ADFC177935", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2020:*:*:*:*:*:*:*", "matchCriteriaId": "371C5F60-4959-40C7-93E1-A01510A95115", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2021:*:*:*:*:*:*:*", "matchCriteriaId": "D83FB4C7-B374-4907-8E2B-EEE61C8339E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2022:*:*:*:*:*:*:*", "matchCriteriaId": "601676EC-2EB4-45D0-B1AE-0980CBD68770", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2022:*:*:*:*:macos:*:*", "matchCriteriaId": "4A2EF334-E4E2-40DA-BD51-B74EE1E0ACCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2023:*:*:*:*:*:*:*", "matchCriteriaId": "99924DDE-3D49-4D37-A361-69B28E7B94A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2019:*:*:*:*:*:*:*", "matchCriteriaId": "04E05510-B21B-4DDD-88D7-CEB8963E1AFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2020:*:*:*:*:*:*:*", "matchCriteriaId": "D4CD010A-FDBC-40F9-95AC-0CD8388B85D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2021:*:*:*:*:*:*:*", "matchCriteriaId": "FC99E0F3-AA11-4390-A7C0-5BBFCDA94E3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2022:*:*:*:*:*:*:*", "matchCriteriaId": "33AA60CF-611C-45FC-92F8-7517D87B1645", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2023:*:*:*:*:*:*:*", "matchCriteriaId": "15A36E1F-964C-4DF2-91D1-D37ECEFC1C86", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2019:*:*:*:*:*:*:*", "matchCriteriaId": "19255CEC-6161-4D44-B87E-52E86DF4FBA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2020:*:*:*:*:*:*:*", "matchCriteriaId": "7147F378-DFB0-48A8-8B05-8777E1CC7F90", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2021:*:*:*:*:*:*:*", "matchCriteriaId": "3B5C858C-4A01-4916-BE3E-B9056D67CF5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2022:*:*:*:*:*:*:*", "matchCriteriaId": "7EB83A4A-D4C2-4509-BD49-15B9BBC7BF97", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2023:*:*:*:*:*:*:*", "matchCriteriaId": "DCF7910A-432F-419E-96E0-25D638A6F298", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2019:*:*:*:*:*:*:*", "matchCriteriaId": "3F608B1C-BA96-4EA8-A540-83870262CBC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2020:*:*:*:*:*:*:*", "matchCriteriaId": "7CFAAD19-6248-42CB-B177-EC2E5141A953", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2021:*:*:*:*:*:*:*", "matchCriteriaId": "1C52D90B-578B-4281-BF0E-B7CDA425ED05", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2022:*:*:*:*:*:*:*", "matchCriteriaId": "4C8AD4F3-AA82-49F5-A18A-85127FDB8B95", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2023:*:*:*:*:*:*:*", "matchCriteriaId": "DF8D9BA5-A043-42DB-A524-6728D3BF2B90", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2019:*:*:*:*:*:*:*", "matchCriteriaId": "4E536B0D-4C95-4589-981A-2F8A6C4B44DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2020:*:*:*:*:*:*:*", "matchCriteriaId": "3FBDD3AC-FA00-462F-AA13-5A75B5D50689", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2021:*:*:*:*:*:*:*", "matchCriteriaId": "73E2E9E8-2269-4729-8D8F-3C26974F5FD2", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2022:*:*:*:*:*:*:*", "matchCriteriaId": "452A1A75-C59A-43AB-9C43-BA49EB95C39C", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2023:*:*:*:*:*:*:*", "matchCriteriaId": "07CB7F37-E6D4-40F3-85BA-EC060E923505", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:-:*:*:*:*:*:*", "matchCriteriaId": "213232B9-A40B-436D-A66A-B65C49D59BE6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A malicious crafted dwf or .pct file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by read access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process." }, { "lang": "es", "value": "Un archivo dwf o .pct malicioso dise\u00f1ado cuando es consumido mediante la aplicaci\u00f3n DesignReview.exe podr\u00eda conllevar a una vulnerabilidad de corrupci\u00f3n de memoria por violaci\u00f3n de acceso de lectura. Esta vulnerabilidad, junto con otras, podr\u00eda conllevar a una ejecuci\u00f3n de c\u00f3digo en el contexto del proceso actual" } ], "id": "CVE-2022-42943", "lastModified": "2024-11-21T07:25:38.793", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-10-21T16:15:12.037", "references": [ { "source": "psirt@autodesk.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ], "sourceIdentifier": "psirt@autodesk.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-10-07 20:00
Modified
2024-11-21 00:51
Severity ?
Summary
The UpdateEngine class in the LiveUpdate ActiveX control (LiveUpdate16.DLL 17.2.56), as used in Revit Architecture 2009 SP2 and Autodesk Design Review 2009, allows remote attackers to execute arbitrary programs via the second argument to the ApplyPatch method.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://images.autodesk.com/adsk/files/live_update_hotfix0.html | ||
cve@mitre.org | http://retrogod.altervista.org/9sg_autodesk_revit_arch_2009_exploit.html | ||
cve@mitre.org | http://securityreason.com/securityalert/4361 | ||
cve@mitre.org | http://usa.autodesk.com/adsk/servlet/ps/dl/item?siteID=123112&id=12452198&linkID=11705366 | ||
cve@mitre.org | http://www.securityfocus.com/archive/1/496847/100/0/threaded | ||
cve@mitre.org | http://www.securityfocus.com/bid/31490 | ||
cve@mitre.org | http://www.vupen.com/english/advisories/2008/2704 | ||
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/45521 | ||
cve@mitre.org | https://www.exploit-db.com/exploits/6630 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://images.autodesk.com/adsk/files/live_update_hotfix0.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://retrogod.altervista.org/9sg_autodesk_revit_arch_2009_exploit.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://securityreason.com/securityalert/4361 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://usa.autodesk.com/adsk/servlet/ps/dl/item?siteID=123112&id=12452198&linkID=11705366 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/496847/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/31490 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/2704 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/45521 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.exploit-db.com/exploits/6630 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
autodesk | design_review | 2009 | |
autodesk | dwf_viewer | * | |
autodesk | revit_architecture | 2009 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autodesk:design_review:2009:*:*:*:*:*:*:*", "matchCriteriaId": "D015F7C3-BBFB-418C-8B50-2047AE1E142E", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:dwf_viewer:*:*:*:*:*:*:*:*", "matchCriteriaId": "9E11496F-A4A3-48B2-BFD4-D00D13BD9E2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:revit_architecture:2009:sp2:*:*:*:*:*:*", "matchCriteriaId": "877A0489-AC5E-4A8C-827B-EDD6EF62E0BD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The UpdateEngine class in the LiveUpdate ActiveX control (LiveUpdate16.DLL 17.2.56), as used in Revit Architecture 2009 SP2 and Autodesk Design Review 2009, allows remote attackers to execute arbitrary programs via the second argument to the ApplyPatch method." }, { "lang": "es", "value": "La clase UpdateEngine en el control Active X LiveUpdate (LiveUpdate16.DLL 17.2.56), utilizado en Revit Architecture 2009 SP2 y Autodesk Design Review 2009, que permite a los atacantes remotos ejecutar arbitrariamente programas a trav\u00e9s del segundo argumento del m\u00e9todo ApplyPatch." } ], "id": "CVE-2008-4472", "lastModified": "2024-11-21T00:51:45.630", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2008-10-07T20:00:17.420", "references": [ { "source": "cve@mitre.org", "url": "http://images.autodesk.com/adsk/files/live_update_hotfix0.html" }, { "source": "cve@mitre.org", "url": "http://retrogod.altervista.org/9sg_autodesk_revit_arch_2009_exploit.html" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/4361" }, { "source": "cve@mitre.org", "url": "http://usa.autodesk.com/adsk/servlet/ps/dl/item?siteID=123112\u0026id=12452198\u0026linkID=11705366" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/496847/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/31490" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/2704" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45521" }, { "source": "cve@mitre.org", "url": "https://www.exploit-db.com/exploits/6630" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://images.autodesk.com/adsk/files/live_update_hotfix0.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://retrogod.altervista.org/9sg_autodesk_revit_arch_2009_exploit.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/4361" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://usa.autodesk.com/adsk/servlet/ps/dl/item?siteID=123112\u0026id=12452198\u0026linkID=11705366" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/496847/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/31490" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/2704" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45521" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/6630" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-07-09 15:15
Modified
2024-11-21 05:57
Severity ?
Summary
A Double Free vulnerability allows remote attackers to execute arbitrary code on PDF files within affected installations of Autodesk Design Review 2018, 2017, 2013, 2012, 2011. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
autodesk | design_review | 2011 | |
autodesk | design_review | 2012 | |
autodesk | design_review | 2013 | |
autodesk | design_review | 2017 | |
autodesk | design_review | 2018 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autodesk:design_review:2011:*:*:*:*:*:*:*", "matchCriteriaId": "83CF6CDF-806C-4DC5-B572-C1C2BC2C25F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2012:*:*:*:*:*:*:*", "matchCriteriaId": "2A78B6F8-DF84-4E6C-A247-0F6D2F8CA679", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2013:*:*:*:*:*:*:*", "matchCriteriaId": "DCD2CA9B-16E1-4BE7-A4E1-A9817A503958", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2017:*:*:*:*:*:*:*", "matchCriteriaId": "31F2529F-ECF0-4568-BBDC-82B396A52332", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:*:*:*:*:*:*:*", "matchCriteriaId": "7D07C55F-1D23-4E2B-AC1E-67D735F800B7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Double Free vulnerability allows remote attackers to execute arbitrary code on PDF files within affected installations of Autodesk Design Review 2018, 2017, 2013, 2012, 2011. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file." }, { "lang": "es", "value": "Una vulnerabilidad Double Free permite a los atacantes remotos ejecutar c\u00f3digo arbitrario en archivos PDF dentro de las instalaciones afectadas de Autodesk Design Review 2018, 2017, 2013, 2012, 2011. Se requiere la interacci\u00f3n del usuario para explotar esta vulnerabilidad, ya que el objetivo debe visitar una p\u00e1gina maliciosa o abrir un archivo malicioso" } ], "id": "CVE-2021-27033", "lastModified": "2024-11-21T05:57:13.067", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-07-09T15:15:07.537", "references": [ { "source": "psirt@autodesk.com", "tags": [ "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ], "sourceIdentifier": "psirt@autodesk.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-415" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-10-21 16:15
Modified
2024-11-21 07:25
Severity ?
Summary
A malicious crafted dwf or .pct file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by read access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@autodesk.com | https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004 | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
autodesk | autocad | 2019 | |
autodesk | autocad | 2020 | |
autodesk | autocad | 2021 | |
autodesk | autocad | 2022 | |
autodesk | autocad | 2022 | |
autodesk | autocad | 2023 | |
autodesk | autocad_advance_steel | 2019 | |
autodesk | autocad_advance_steel | 2020 | |
autodesk | autocad_advance_steel | 2021 | |
autodesk | autocad_advance_steel | 2022 | |
autodesk | autocad_advance_steel | 2023 | |
autodesk | autocad_architecture | 2019 | |
autodesk | autocad_architecture | 2020 | |
autodesk | autocad_architecture | 2021 | |
autodesk | autocad_architecture | 2022 | |
autodesk | autocad_architecture | 2023 | |
autodesk | autocad_civil_3d | 2019 | |
autodesk | autocad_civil_3d | 2020 | |
autodesk | autocad_civil_3d | 2021 | |
autodesk | autocad_civil_3d | 2022 | |
autodesk | autocad_civil_3d | 2023 | |
autodesk | autocad_electrical | 2019 | |
autodesk | autocad_electrical | 2020 | |
autodesk | autocad_electrical | 2021 | |
autodesk | autocad_electrical | 2022 | |
autodesk | autocad_electrical | 2023 | |
autodesk | autocad_lt | 2019 | |
autodesk | autocad_lt | 2020 | |
autodesk | autocad_lt | 2021 | |
autodesk | autocad_lt | 2022 | |
autodesk | autocad_lt | 2022 | |
autodesk | autocad_lt | 2023 | |
autodesk | autocad_map_3d | 2019 | |
autodesk | autocad_map_3d | 2020 | |
autodesk | autocad_map_3d | 2021 | |
autodesk | autocad_map_3d | 2022 | |
autodesk | autocad_map_3d | 2023 | |
autodesk | autocad_mechanical | 2019 | |
autodesk | autocad_mechanical | 2020 | |
autodesk | autocad_mechanical | 2021 | |
autodesk | autocad_mechanical | 2022 | |
autodesk | autocad_mechanical | 2023 | |
autodesk | autocad_mep | 2019 | |
autodesk | autocad_mep | 2020 | |
autodesk | autocad_mep | 2021 | |
autodesk | autocad_mep | 2022 | |
autodesk | autocad_mep | 2023 | |
autodesk | autocad_plant_3d | 2019 | |
autodesk | autocad_plant_3d | 2020 | |
autodesk | autocad_plant_3d | 2021 | |
autodesk | autocad_plant_3d | 2022 | |
autodesk | autocad_plant_3d | 2023 | |
autodesk | design_review | 2018 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autodesk:autocad:2019:*:*:*:*:*:*:*", "matchCriteriaId": "411DC826-735A-4BEB-84BE-9250F97F612E", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2020:*:*:*:*:*:*:*", "matchCriteriaId": "E30E2562-D38E-4764-874E-5B2FCF5639E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2021:*:*:*:*:*:*:*", "matchCriteriaId": "88B2C295-D091-4C1D-8285-4309967707BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2022:*:*:*:*:*:*:*", "matchCriteriaId": "EACE09F2-A323-4E4B-9A35-4EBAE3864E6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2022:*:*:*:*:macos:*:*", "matchCriteriaId": "68FC54D1-B4FC-404E-9742-72F8340FE3C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2023:*:*:*:*:*:*:*", "matchCriteriaId": "2241C287-9396-4AD8-B93C-3596394AB2D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:2019:*:*:*:*:*:*:*", "matchCriteriaId": "9B1CAD53-7C63-4E5D-BD2E-364A7A87AA1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:2020:*:*:*:*:*:*:*", "matchCriteriaId": "127F5A79-8E66-4ABD-8D88-8891C6D670D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:2021:*:*:*:*:*:*:*", "matchCriteriaId": "37D8982C-E506-4988-AA97-BDF1B1C3D71A", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:2022:*:*:*:*:*:*:*", "matchCriteriaId": "002AC200-6AE2-4817-91D3-957DA3AC9787", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:2023:*:*:*:*:*:*:*", "matchCriteriaId": "E881C720-E487-463E-A364-A1F9EC3C1D24", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2019:*:*:*:*:*:*:*", "matchCriteriaId": "9275E76C-2A79-462A-A9D3-D0B6BBCDD0CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2020:*:*:*:*:*:*:*", "matchCriteriaId": "B7DFA12E-48C5-47B9-BD9F-1AFACBF4E1EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2021:*:*:*:*:*:*:*", "matchCriteriaId": "535A5D39-1C82-4301-9E5B-C9E0D75F38B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2022:*:*:*:*:*:*:*", "matchCriteriaId": "316615EC-BC9F-4B6A-8163-EBECC480EFDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2023:*:*:*:*:*:*:*", "matchCriteriaId": "546AFB2D-F78A-40C2-AC55-7D07EF0BDC7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2019:*:*:*:*:*:*:*", "matchCriteriaId": "AB3A878B-2142-404F-BCF4-BB508674C6C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2020:*:*:*:*:*:*:*", "matchCriteriaId": "64F2EC88-168D-4DD1-9ADA-3F9FA60D6E35", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2021:*:*:*:*:*:*:*", "matchCriteriaId": "5D73C803-7567-4C1D-B62A-C3C52369022D", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2022:*:*:*:*:*:*:*", "matchCriteriaId": "C5F77B03-3221-4564-B4FF-7BF7EEC1C5B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2023:*:*:*:*:*:*:*", "matchCriteriaId": "C6E001C0-0D7B-44ED-BBE8-E6635C45F988", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2019:*:*:*:*:*:*:*", "matchCriteriaId": "A10DE5AF-1718-4899-9238-CFFDC72D05B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2020:*:*:*:*:*:*:*", "matchCriteriaId": "E388264D-D2D4-4BE4-9097-8F547D73ABE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2021:*:*:*:*:*:*:*", "matchCriteriaId": "16611BAA-C200-4C8B-823F-1AB95F5E1317", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2022:*:*:*:*:*:*:*", "matchCriteriaId": "E2DC5114-48D2-4D85-8E80-B4BCB0FD78F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2023:*:*:*:*:*:*:*", "matchCriteriaId": "A2949D87-C1FA-43C3-8F1F-08ED7A64F302", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2019:*:*:*:*:*:*:*", "matchCriteriaId": "03682B7E-1CF1-4456-A51F-A6ADFC177935", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2020:*:*:*:*:*:*:*", "matchCriteriaId": "371C5F60-4959-40C7-93E1-A01510A95115", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2021:*:*:*:*:*:*:*", "matchCriteriaId": "D83FB4C7-B374-4907-8E2B-EEE61C8339E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2022:*:*:*:*:*:*:*", "matchCriteriaId": "601676EC-2EB4-45D0-B1AE-0980CBD68770", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2022:*:*:*:*:macos:*:*", "matchCriteriaId": "4A2EF334-E4E2-40DA-BD51-B74EE1E0ACCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2023:*:*:*:*:*:*:*", "matchCriteriaId": "99924DDE-3D49-4D37-A361-69B28E7B94A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2019:*:*:*:*:*:*:*", "matchCriteriaId": "04E05510-B21B-4DDD-88D7-CEB8963E1AFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2020:*:*:*:*:*:*:*", "matchCriteriaId": "D4CD010A-FDBC-40F9-95AC-0CD8388B85D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2021:*:*:*:*:*:*:*", "matchCriteriaId": "FC99E0F3-AA11-4390-A7C0-5BBFCDA94E3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2022:*:*:*:*:*:*:*", "matchCriteriaId": "33AA60CF-611C-45FC-92F8-7517D87B1645", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2023:*:*:*:*:*:*:*", "matchCriteriaId": "15A36E1F-964C-4DF2-91D1-D37ECEFC1C86", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2019:*:*:*:*:*:*:*", "matchCriteriaId": "19255CEC-6161-4D44-B87E-52E86DF4FBA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2020:*:*:*:*:*:*:*", "matchCriteriaId": "7147F378-DFB0-48A8-8B05-8777E1CC7F90", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2021:*:*:*:*:*:*:*", "matchCriteriaId": "3B5C858C-4A01-4916-BE3E-B9056D67CF5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2022:*:*:*:*:*:*:*", "matchCriteriaId": "7EB83A4A-D4C2-4509-BD49-15B9BBC7BF97", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2023:*:*:*:*:*:*:*", "matchCriteriaId": "DCF7910A-432F-419E-96E0-25D638A6F298", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2019:*:*:*:*:*:*:*", "matchCriteriaId": "3F608B1C-BA96-4EA8-A540-83870262CBC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2020:*:*:*:*:*:*:*", "matchCriteriaId": "7CFAAD19-6248-42CB-B177-EC2E5141A953", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2021:*:*:*:*:*:*:*", "matchCriteriaId": "1C52D90B-578B-4281-BF0E-B7CDA425ED05", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2022:*:*:*:*:*:*:*", "matchCriteriaId": "4C8AD4F3-AA82-49F5-A18A-85127FDB8B95", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2023:*:*:*:*:*:*:*", "matchCriteriaId": "DF8D9BA5-A043-42DB-A524-6728D3BF2B90", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2019:*:*:*:*:*:*:*", "matchCriteriaId": "4E536B0D-4C95-4589-981A-2F8A6C4B44DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2020:*:*:*:*:*:*:*", "matchCriteriaId": "3FBDD3AC-FA00-462F-AA13-5A75B5D50689", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2021:*:*:*:*:*:*:*", "matchCriteriaId": "73E2E9E8-2269-4729-8D8F-3C26974F5FD2", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2022:*:*:*:*:*:*:*", "matchCriteriaId": "452A1A75-C59A-43AB-9C43-BA49EB95C39C", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2023:*:*:*:*:*:*:*", "matchCriteriaId": "07CB7F37-E6D4-40F3-85BA-EC060E923505", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:-:*:*:*:*:*:*", "matchCriteriaId": "213232B9-A40B-436D-A66A-B65C49D59BE6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A malicious crafted dwf or .pct file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by read access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process." }, { "lang": "es", "value": "Un archivo dwf o .pct malicioso dise\u00f1ado cuando es consumido mediante la aplicaci\u00f3n DesignReview.exe podr\u00eda conllevar a una vulnerabilidad de corrupci\u00f3n de memoria por violaci\u00f3n de acceso de lectura. Esta vulnerabilidad, junto con otras, podr\u00eda conllevar a una ejecuci\u00f3n de c\u00f3digo en el contexto del proceso actual" } ], "id": "CVE-2022-42941", "lastModified": "2024-11-21T07:25:38.510", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-10-21T16:15:11.953", "references": [ { "source": "psirt@autodesk.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ], "sourceIdentifier": "psirt@autodesk.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-12-15 21:59
Modified
2024-11-21 02:38
Severity ?
Summary
Multiple buffer overflows in Autodesk Design Review (ADR) before 2013 Hotfix 2 allow remote attackers to execute arbitrary code via crafted RLE data in a (1) BMP or (2) FLI file, (3) encoded scan lines in a PCX file, or (4) DataSubBlock or (5) GlobalColorTable in a GIF file.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.zerodayinitiative.com/advisories/ZDI-15-615 | ||
cve@mitre.org | http://www.zerodayinitiative.com/advisories/ZDI-15-616 | ||
cve@mitre.org | http://www.zerodayinitiative.com/advisories/ZDI-15-618 | ||
cve@mitre.org | http://www.zerodayinitiative.com/advisories/ZDI-15-619 | ||
cve@mitre.org | http://www.zerodayinitiative.com/advisories/ZDI-15-620 | ||
cve@mitre.org | https://knowledge.autodesk.com/support/design-review/downloads/caas/downloads/content/autodesk-design-review-2013-hotfix.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.zerodayinitiative.com/advisories/ZDI-15-615 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.zerodayinitiative.com/advisories/ZDI-15-616 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.zerodayinitiative.com/advisories/ZDI-15-618 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.zerodayinitiative.com/advisories/ZDI-15-619 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.zerodayinitiative.com/advisories/ZDI-15-620 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://knowledge.autodesk.com/support/design-review/downloads/caas/downloads/content/autodesk-design-review-2013-hotfix.html | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
autodesk | design_review | 2013 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autodesk:design_review:2013:*:*:*:*:*:*:*", "matchCriteriaId": "DCD2CA9B-16E1-4BE7-A4E1-A9817A503958", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in Autodesk Design Review (ADR) before 2013 Hotfix 2 allow remote attackers to execute arbitrary code via crafted RLE data in a (1) BMP or (2) FLI file, (3) encoded scan lines in a PCX file, or (4) DataSubBlock or (5) GlobalColorTable in a GIF file." }, { "lang": "es", "value": "M\u00faltiples desbordamientos de buffer en Autodesk Design Review (ADR) en versiones anteriores a 2013 Hotfix 2 permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de datos RLE manipulados en (1) un archivo BMP o (2) un archivo FLI, (3) l\u00edneas de escaneo codificadas en un archivo PCX , o (4) DataSubBlock o (5) GlobalColorTable en un archivo GIF." } ], "id": "CVE-2015-8572", "lastModified": "2024-11-21T02:38:45.863", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2015-12-15T21:59:13.690", "references": [ { "source": "cve@mitre.org", "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-615" }, { "source": "cve@mitre.org", "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-616" }, { "source": "cve@mitre.org", "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-618" }, { "source": "cve@mitre.org", "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-619" }, { "source": "cve@mitre.org", "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-620" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://knowledge.autodesk.com/support/design-review/downloads/caas/downloads/content/autodesk-design-review-2013-hotfix.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-615" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-616" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-618" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-619" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-620" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://knowledge.autodesk.com/support/design-review/downloads/caas/downloads/content/autodesk-design-review-2013-hotfix.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-10-03 15:15
Modified
2024-11-21 07:08
Severity ?
Summary
A maliciously crafted PCT or DWF file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by read access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
autodesk | autocad | * | |
autodesk | autocad | * | |
autodesk | autocad_advance_steel | * | |
autodesk | autocad_advance_steel | * | |
autodesk | autocad_architecture | * | |
autodesk | autocad_architecture | * | |
autodesk | autocad_civil_3d | * | |
autodesk | autocad_civil_3d | * | |
autodesk | autocad_electrical | * | |
autodesk | autocad_electrical | * | |
autodesk | autocad_lt | * | |
autodesk | autocad_lt | * | |
autodesk | autocad_map_3d | * | |
autodesk | autocad_map_3d | * | |
autodesk | autocad_mechanical | * | |
autodesk | autocad_mechanical | * | |
autodesk | autocad_mep | * | |
autodesk | autocad_mep | * | |
autodesk | autocad_plant_3d | * | |
autodesk | autocad_plant_3d | * | |
autodesk | design_review | 2018 | |
autodesk | design_review | 2018 | |
autodesk | design_review | 2018 | |
autodesk | design_review | 2018 | |
autodesk | design_review | 2018 | |
autodesk | design_review | 2018 | |
autodesk | design_review | 2018 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*", "matchCriteriaId": "F867A29B-ABEA-40D8-9252-9129DBC4EEEC", "versionEndExcluding": "2022.1.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*", "matchCriteriaId": "480910B3-5FD0-47EF-98BA-FDFE22945BB0", "versionEndExcluding": "2023.1.1", "versionStartIncluding": "2023.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:*:*:*:*:*:*:*:*", "matchCriteriaId": "354E7B7A-22BA-4EB2-B136-9622A8032167", "versionEndExcluding": "2022.1.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:*:*:*:*:*:*:*:*", "matchCriteriaId": "91A206DF-6922-4CF8-9481-E6A4A2953753", "versionEndExcluding": "2023.1.1", "versionStartIncluding": "2023.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*", "matchCriteriaId": "B0381CFD-48B1-4BA4-9961-64544267F852", "versionEndExcluding": "2022.1.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*", "matchCriteriaId": "729710F9-F4F9-4466-8FA2-22A0C0CF9420", "versionEndExcluding": "2023.1.1", "versionStartIncluding": "2023.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "3CEE7EBE-109D-43EC-9411-8169E589670A", "versionEndExcluding": "2022.1.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "F1C62E65-FD27-478A-A472-FBDA4C751BB5", "versionEndExcluding": "2023.1.1", "versionStartIncluding": "2023.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*", "matchCriteriaId": "AF33C631-4C2E-4A18-B5E8-A2037BF29196", "versionEndExcluding": "2022.1.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*", "matchCriteriaId": "F1A13743-F25B-47BC-902A-E7ADB9ACA577", "versionEndExcluding": "2023.1.1", "versionStartIncluding": "2023.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:*:*:*", "matchCriteriaId": "42E5B8D3-9B23-4DC0-B7CE-BB7EC8D981F0", "versionEndExcluding": "2022.1.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:*:*:*", "matchCriteriaId": "20E3E3AA-051D-44E2-BD4A-8EBFCFD11C8C", "versionEndExcluding": "2023.1.1", "versionStartIncluding": "2023.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "2ACB4E3C-FE40-4416-8484-A3A3B6883286", "versionEndExcluding": "2022.1.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA7C36AC-ED97-4669-AD61-75AA00F0385C", "versionEndExcluding": "2023.1.1", "versionStartIncluding": "2023.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*", "matchCriteriaId": "E3107206-44ED-45CB-A218-AC8E12CD4409", "versionEndExcluding": "2022.1.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*", "matchCriteriaId": "1F4ADAD1-5627-4BD2-A72B-DEC95415261F", "versionEndExcluding": "2023.1.1", "versionStartIncluding": "2023.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*", "matchCriteriaId": "C3357899-6803-4D09-94F0-7A633DB05E85", "versionEndExcluding": "2022.1.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*", "matchCriteriaId": "7FDA3E45-B980-4715-80CC-C29B4A3900C3", "versionEndExcluding": "2023.1.1", "versionStartIncluding": "2023.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "9AC1E832-B725-4F72-812F-000ADE262DEA", "versionEndExcluding": "2022.1.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "0A20490C-CDFD-4FCE-B5E3-1F2F78A0C531", "versionEndExcluding": "2023.1.1", "versionStartIncluding": "2023.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:-:*:*:*:*:*:*", "matchCriteriaId": "213232B9-A40B-436D-A66A-B65C49D59BE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix:*:*:*:*:*:*", "matchCriteriaId": "2D0CF4DC-ACA5-41D0-B28E-CEB5D2C96F71", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix2:*:*:*:*:*:*", "matchCriteriaId": "84ED1789-A17F-48F7-A152-09D2A5C59254", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix3:*:*:*:*:*:*", "matchCriteriaId": "74819924-EB63-4BBF-9986-FEF6100EEE15", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix4:*:*:*:*:*:*", "matchCriteriaId": "100922EF-C773-4798-B352-B16FCAD48F36", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix5:*:*:*:*:*:*", "matchCriteriaId": "1C7E8CE3-8A75-4357-8722-17E2CE2378CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix6:*:*:*:*:*:*", "matchCriteriaId": "41A96F19-544E-471F-B6BF-9CC8E9403A2A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A maliciously crafted PCT or DWF file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by read access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process." }, { "lang": "es", "value": "Un archivo PCT o DWF malicioso cuando se consume a trav\u00e9s de la aplicaci\u00f3n DesignReview.exe podr\u00eda llevar a una vulnerabilidad de corrupci\u00f3n de memoria por violaci\u00f3n de acceso de lectura. Esta vulnerabilidad, junto con otras, podr\u00eda conducir a la ejecuci\u00f3n de c\u00f3digo en el contexto del proceso actual" } ], "id": "CVE-2022-33890", "lastModified": "2024-11-21T07:08:32.367", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-10-03T15:15:17.837", "references": [ { "source": "psirt@autodesk.com", "tags": [ "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0021" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0021" } ], "sourceIdentifier": "psirt@autodesk.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-07-09 15:15
Modified
2024-11-21 05:57
Severity ?
Summary
A maliciously crafted PCX, PICT, RCL, TIF, BMP, PSD or TIFF file can be used to write beyond the allocated buffer while parsing PCX, PDF, PICT, RCL, BMP, PSD or TIFF files. This vulnerability can be exploited to execute arbitrary code
References
▼ | URL | Tags | |
---|---|---|---|
psirt@autodesk.com | https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004 | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
autodesk | design_review | 2011 | |
autodesk | design_review | 2012 | |
autodesk | design_review | 2013 | |
autodesk | design_review | 2017 | |
autodesk | design_review | 2018 | |
autodesk | design_review | 2018 | |
autodesk | design_review | 2018 | |
autodesk | design_review | 2018 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autodesk:design_review:2011:*:*:*:*:*:*:*", "matchCriteriaId": "83CF6CDF-806C-4DC5-B572-C1C2BC2C25F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2012:*:*:*:*:*:*:*", "matchCriteriaId": "2A78B6F8-DF84-4E6C-A247-0F6D2F8CA679", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2013:*:*:*:*:*:*:*", "matchCriteriaId": "DCD2CA9B-16E1-4BE7-A4E1-A9817A503958", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2017:*:*:*:*:*:*:*", "matchCriteriaId": "31F2529F-ECF0-4568-BBDC-82B396A52332", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:-:*:*:*:*:*:*", "matchCriteriaId": "213232B9-A40B-436D-A66A-B65C49D59BE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix:*:*:*:*:*:*", "matchCriteriaId": "2D0CF4DC-ACA5-41D0-B28E-CEB5D2C96F71", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix2:*:*:*:*:*:*", "matchCriteriaId": "84ED1789-A17F-48F7-A152-09D2A5C59254", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix3:*:*:*:*:*:*", "matchCriteriaId": "74819924-EB63-4BBF-9986-FEF6100EEE15", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A maliciously crafted PCX, PICT, RCL, TIF, BMP, PSD or TIFF file can be used to write beyond the allocated buffer while parsing PCX, PDF, PICT, RCL, BMP, PSD or TIFF files. This vulnerability can be exploited to execute arbitrary code" }, { "lang": "es", "value": "Un archivo PCX, PICT, RCL, TIF, BMP, PSD o TIFF malicioso puede utilizarse para escribir m\u00e1s all\u00e1 del b\u00fafer asignado mientras se analizan archivos PCX, PDF, PICT, RCL, BMP, PSD o TIFF. Esta vulnerabilidad puede ser explotada para ejecutar c\u00f3digo arbitrario" } ], "id": "CVE-2021-27036", "lastModified": "2024-11-21T05:57:13.430", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-07-09T15:15:08.040", "references": [ { "source": "psirt@autodesk.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ], "sourceIdentifier": "psirt@autodesk.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-10-07 18:15
Modified
2024-11-21 06:23
Severity ?
Summary
A maliciously crafted TIF, PICT, TGA, or RLC files in Autodesk Image Processing component may be forced to read beyond allocated boundaries when parsing the TIFF, PICT, TGA, or RLC files. This vulnerability may be exploited to execute arbitrary code.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
autodesk | autocad | * | |
autodesk | autocad | * | |
autodesk | autocad | * | |
autodesk | autocad | * | |
autodesk | autocad_advance_steel | * | |
autodesk | autocad_advance_steel | * | |
autodesk | autocad_advance_steel | * | |
autodesk | autocad_advance_steel | * | |
autodesk | autocad_architecture | * | |
autodesk | autocad_architecture | * | |
autodesk | autocad_architecture | * | |
autodesk | autocad_architecture | * | |
autodesk | autocad_civil_3d | * | |
autodesk | autocad_civil_3d | * | |
autodesk | autocad_civil_3d | * | |
autodesk | autocad_civil_3d | * | |
autodesk | autocad_electrical | * | |
autodesk | autocad_electrical | * | |
autodesk | autocad_electrical | * | |
autodesk | autocad_electrical | * | |
autodesk | autocad_lt | * | |
autodesk | autocad_lt | * | |
autodesk | autocad_lt | * | |
autodesk | autocad_lt | * | |
autodesk | autocad_lt | * | |
autodesk | autocad_lt | * | |
autodesk | autocad_lt | * | |
autodesk | autocad_map_3d | * | |
autodesk | autocad_map_3d | * | |
autodesk | autocad_map_3d | * | |
autodesk | autocad_map_3d | * | |
autodesk | autocad_mechanical | * | |
autodesk | autocad_mechanical | * | |
autodesk | autocad_mechanical | * | |
autodesk | autocad_mechanical | * | |
autodesk | autocad_mep | * | |
autodesk | autocad_mep | * | |
autodesk | autocad_mep | * | |
autodesk | autocad_mep | * | |
autodesk | autocad_plant_3d | * | |
autodesk | autocad_plant_3d | * | |
autodesk | autocad_plant_3d | * | |
autodesk | autocad_plant_3d | * | |
autodesk | design_review | 2018 | |
autodesk | design_review | 2018 | |
autodesk | design_review | 2018 | |
autodesk | design_review | 2018 | |
autodesk | dwg_trueview | * | |
autodesk | dwg_trueview | * | |
autodesk | dwg_trueview | * | |
autodesk | dwg_trueview | * | |
autodesk | fusion | * | |
autodesk | infrastructure_parts_editor | * | |
autodesk | infrastructure_parts_editor | * | |
autodesk | infrastructure_parts_editor | 2021 | |
autodesk | infrastructure_parts_editor | 2022 | |
autodesk | infraworks | * | |
autodesk | infraworks | * | |
autodesk | infraworks | * | |
autodesk | infraworks | 2019.3 | |
autodesk | infraworks | 2019.3 | |
autodesk | infraworks | 2019.3 | |
autodesk | infraworks | 2019.3 | |
autodesk | infraworks | 2020.2 | |
autodesk | infraworks | 2020.2 | |
autodesk | infraworks | 2020.2 | |
autodesk | infraworks | 2021.2 | |
autodesk | infraworks | 2021.2 | |
autodesk | infraworks | 2021.2 | |
autodesk | infraworks | 2022.0 | |
autodesk | infraworks | 2022.0 | |
autodesk | infraworks | 2022.1 | |
autodesk | inventor | * | |
autodesk | inventor | * | |
autodesk | inventor | * | |
autodesk | inventor | * | |
autodesk | navisworks | * | |
autodesk | navisworks | * | |
autodesk | navisworks | * | |
autodesk | navisworks | * | |
autodesk | revit | * | |
autodesk | revit | * | |
autodesk | revit | * | |
autodesk | revit | 2022 | |
autodesk | storm_and_sanitary_analysis | * | |
autodesk | storm_and_sanitary_analysis | * | |
autodesk | storm_and_sanitary_analysis | 2019 | |
autodesk | storm_and_sanitary_analysis | 2022 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*", "matchCriteriaId": "B0E84020-F179-4AF3-BF9C-6D27259B2847", "versionEndExcluding": "2019.1.4", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*", "matchCriteriaId": "87941CE7-7F89-4A09-BBE8-A0D829273A63", "versionEndExcluding": "2020.1.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*", "matchCriteriaId": "6F98B75B-1471-42A7-BCDA-95F7E65B7FD1", "versionEndExcluding": "2021.1.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C5F50DF-4792-4A29-BB21-5821CA5E3A22", "versionEndExcluding": "2022.1.2", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:*:*:*:*:*:*:*:*", "matchCriteriaId": "183990CB-4AA2-4EEE-8A14-8BF3AD203347", "versionEndExcluding": "2019.1.4", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:*:*:*:*:*:*:*:*", "matchCriteriaId": "4A416E4B-0910-45FB-B468-A6D159C6FD11", "versionEndExcluding": "2020.1.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A873E71-BC29-43BC-AFB2-98C06AE29F3B", "versionEndExcluding": "2021.1.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:*:*:*:*:*:*:*:*", "matchCriteriaId": "ED3A19CA-3D6A-42D6-86C5-6B4E494064FF", "versionEndExcluding": "2022.1.2", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*", "matchCriteriaId": "C9338B09-BCD8-4E67-A331-1B8D5FB5DA24", "versionEndExcluding": "2019.1.4", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*", "matchCriteriaId": "F616B84F-B471-43B9-BC5D-BA6CCE461F56", "versionEndExcluding": "2020.1.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*", "matchCriteriaId": "AD0B37E9-4987-4B96-9B31-6168961E1496", "versionEndExcluding": "2021.1.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9466EE6-83C9-492F-8486-F3E6C1DD9F5A", "versionEndExcluding": "2022.1.2", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "20371433-EA59-442E-947A-CF0A6AFD750C", "versionEndExcluding": "2019.1.4", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "AF176D9D-1FAE-42DA-B03C-5A3E66408D52", "versionEndExcluding": "2020.1.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "FD0CB6CF-53F6-4FED-8BE5-F3E31832237F", "versionEndExcluding": "2021.1.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "145CD700-BC3E-4F2B-82ED-FA51A0296C67", "versionEndExcluding": "2022.1.2", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*", "matchCriteriaId": "86CF88E0-A49D-4528-8135-6BE5C9E5DD7C", "versionEndExcluding": "2019.1.4", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*", "matchCriteriaId": "E716111F-273B-48DF-ADEA-44BADE5E7FEB", "versionEndExcluding": "2020.1.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*", "matchCriteriaId": "71FA0271-BE55-48AD-B88D-34645684E9DE", "versionEndExcluding": "2021.1.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*", "matchCriteriaId": "6DD91E39-A3D8-4806-A778-608FD6C29BB2", "versionEndExcluding": "2022.1.2", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:*:*:*", "matchCriteriaId": "77A1562A-07B8-4130-B319-1BE2800D8771", "versionEndExcluding": "2019.1.4", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:*:*:*", "matchCriteriaId": "0E59ACB5-8745-46A8-889E-005DEA38925B", "versionEndExcluding": "2020.1.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:macos:*:*", "matchCriteriaId": "8FB94403-A063-4BDB-BE35-E198BF128709", "versionEndExcluding": "2020.3.2", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:*:*:*", "matchCriteriaId": "CFFE146F-4AB2-45B2-9F87-52DD8DC26B85", "versionEndExcluding": "2021.1.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:macos:*:*", "matchCriteriaId": "06B6CA6F-48E9-4A48-B1A2-7537DCE9939E", "versionEndExcluding": "2021.2.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:*:*:*", "matchCriteriaId": "D01E3771-86FD-483D-BCCB-1B1CDD4C482F", "versionEndExcluding": "2022.1.2", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:macos:*:*", "matchCriteriaId": "EEC464C9-D741-41B4-B460-B4305BCD83FA", "versionEndExcluding": "2022.2.2", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "230F8974-9613-4B58-8621-67CCE81E208C", "versionEndExcluding": "2019.1.4", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "D9184783-2476-4ED0-9F05-CA2AC68446B3", "versionEndExcluding": "2020.1.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "752B8F1C-54E3-4985-97A4-86FBF13E6BFD", "versionEndExcluding": "2021.1.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "120326C3-E212-4341-A25D-BC3DD50CF228", "versionEndExcluding": "2022.1.2", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*", "matchCriteriaId": "AF0FCE36-8A0F-4CDB-86B3-D8F7875511FD", "versionEndExcluding": "2019.1.4", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*", "matchCriteriaId": "5BAA6D71-2B11-4490-A1C4-652347582EF6", "versionEndExcluding": "2020.1.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*", "matchCriteriaId": "6F78C528-605C-46F3-8CF0-828B682745B3", "versionEndExcluding": "2021.1.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*", "matchCriteriaId": "B117299A-C5FE-419F-9C1C-DF58A2772055", "versionEndExcluding": "2022.1.2", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*", "matchCriteriaId": "1075AC6C-C9E1-45EA-B371-B06235C6AA86", "versionEndExcluding": "2019.1.4", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*", "matchCriteriaId": "CBC04C9D-9E69-4CB7-BF7A-D3B8C0670114", "versionEndExcluding": "2020.1.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E140DC9-7000-48ED-A5C7-B23023DFB199", "versionEndExcluding": "2021.1.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*", "matchCriteriaId": "CC178212-E440-46E9-9F00-60A5516D4D72", "versionEndExcluding": "2022.1.2", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "C71A1AD7-4651-4FA9-9114-023E07DCB285", "versionEndExcluding": "2019.1.4", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "C2A2E5FC-9717-47C1-A223-F90DC572DAB0", "versionEndExcluding": "2020.1.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "984491F0-8303-4C6C-B884-00C032D797DD", "versionEndExcluding": "2021.1.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "7ED0DB1D-6F37-4C1B-B55E-42F3A4E34299", "versionEndExcluding": "2022.1.2", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:-:*:*:*:*:*:*", "matchCriteriaId": "213232B9-A40B-436D-A66A-B65C49D59BE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix:*:*:*:*:*:*", "matchCriteriaId": "2D0CF4DC-ACA5-41D0-B28E-CEB5D2C96F71", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix2:*:*:*:*:*:*", "matchCriteriaId": "84ED1789-A17F-48F7-A152-09D2A5C59254", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix3:*:*:*:*:*:*", "matchCriteriaId": "74819924-EB63-4BBF-9986-FEF6100EEE15", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:dwg_trueview:*:*:*:*:*:*:*:*", "matchCriteriaId": "3FB6CD03-F783-49F7-A9D2-C97C642E8B29", "versionEndExcluding": "2019.1.4", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:dwg_trueview:*:*:*:*:*:*:*:*", "matchCriteriaId": "7E9DF065-576B-46B8-9F64-A16D9CB25398", "versionEndExcluding": "2020.1.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:dwg_trueview:*:*:*:*:*:*:*:*", "matchCriteriaId": "631D559D-B4CB-4D6A-93A7-94C0CA9C232B", "versionEndExcluding": "2021.1.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:dwg_trueview:*:*:*:*:*:*:*:*", "matchCriteriaId": "713BBAEC-BE6D-40BC-9FB3-EBB906FB09BA", "versionEndExcluding": "2022.1.1", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E6ACCB8-A327-484D-A542-9BC30BA4554A", "versionEndExcluding": "2.0.11405", "versionStartIncluding": "2.0.10356", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infrastructure_parts_editor:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F3054F1-0ED3-4C71-90E0-764EC5757F6B", "versionEndExcluding": "2019.2.2", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infrastructure_parts_editor:*:*:*:*:*:*:*:*", "matchCriteriaId": "27BA9C22-0044-429D-AD68-C040DF0E1E34", "versionEndExcluding": "2020.0.2", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infrastructure_parts_editor:2021:*:*:*:*:*:*:*", "matchCriteriaId": "C59A098D-F778-49BB-8B02-61DFA956D456", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infrastructure_parts_editor:2022:*:*:*:*:*:*:*", "matchCriteriaId": "829ACB24-271D-440F-8723-FDAE2430373E", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:*:*:*:*:*:*:*:*", "matchCriteriaId": "36D46284-4E2E-4C56-B830-3C786D5A238F", "versionEndExcluding": "2019.3", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:*:*:*:*:*:*:*:*", "matchCriteriaId": "180513CE-CEC1-4FF7-B1CB-03835D6B8797", "versionEndExcluding": "2020.2", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:*:*:*:*:*:*:*:*", "matchCriteriaId": "FE68AFE1-0F44-4B37-87E5-C7D658186425", "versionEndExcluding": "2021.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:2019.3:-:*:*:*:*:*:*", "matchCriteriaId": "6974FEA3-2CDE-438D-A153-372A20E0338A", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:2019.3:hotfix_1:*:*:*:*:*:*", "matchCriteriaId": "3D85361A-B19D-444A-A075-73DF234C081B", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:2019.3:hotfix_2:*:*:*:*:*:*", "matchCriteriaId": "8F7898E8-E540-4775-943C-26A4A7A7BA60", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:2019.3:hotfix_3:*:*:*:*:*:*", "matchCriteriaId": "5C6290F4-E5E6-4146-982E-9CB0FC693B5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:2020.2:-:*:*:*:*:*:*", "matchCriteriaId": "9A3FB713-593D-4CF4-97EE-10498DF3B008", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:2020.2:hotfix_1:*:*:*:*:*:*", "matchCriteriaId": "1AF37BF8-1921-4D94-89D3-7890F2DA7048", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:2020.2:hotfix_2:*:*:*:*:*:*", "matchCriteriaId": "7A1EAD58-4213-4340-9019-543A223C155D", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:2021.2:-:*:*:*:*:*:*", "matchCriteriaId": "E8799159-8E69-4463-96D9-920E64A675B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:2021.2:hotfix_1:*:*:*:*:*:*", "matchCriteriaId": "DDAE8B1C-5799-4FCB-AA1F-E01C72C545B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:2021.2:hotfix_2:*:*:*:*:*:*", "matchCriteriaId": "BAB28476-5965-441D-AAEF-F76F7C599F3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:2022.0:-:*:*:*:*:*:*", "matchCriteriaId": "23B89172-71E0-482F-ABD9-E640EE18E1B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:2022.0:hotfix_1:*:*:*:*:*:*", "matchCriteriaId": "C7E432F3-925E-4120-9568-F679302A26B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:2022.1:*:*:*:*:*:*:*", "matchCriteriaId": "CA85576C-0D0E-4724-AC3F-0FCB9B4F7D2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:inventor:*:*:*:*:*:*:*:*", "matchCriteriaId": "CE08EFFE-4D11-4CFD-A013-4ABEB5D8D36F", "versionEndExcluding": "2019.6", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:inventor:*:*:*:*:*:*:*:*", "matchCriteriaId": "72B1AA4E-8E9C-40C3-9402-92B64BE19D83", "versionEndExcluding": "2020.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:inventor:*:*:*:*:*:*:*:*", "matchCriteriaId": "400ADD0C-F69C-41DF-B682-5DE90B2BC142", "versionEndExcluding": "2021.4", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:inventor:*:*:*:*:*:*:*:*", "matchCriteriaId": "D53B7E4C-4F2E-428D-A6CB-D4F2FB5865B0", "versionEndExcluding": "2022.2", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:navisworks:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA8C5795-C1E7-4E84-BAFD-A2F16DCD0B51", "versionEndExcluding": "2019.7", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:navisworks:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC07E959-8A9E-448D-9E4F-EF7D41C4B1A7", "versionEndExcluding": "2020.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:navisworks:*:*:*:*:*:*:*:*", "matchCriteriaId": "DD6A1944-2576-406F-8010-9080C68654D5", "versionEndExcluding": "2021.4", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:navisworks:*:*:*:*:*:*:*:*", "matchCriteriaId": "7AAFCE8D-C6FA-4179-BBD8-134F91261FEC", "versionEndExcluding": "2022.2", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:*", "matchCriteriaId": "34EEF338-800E-4350-BC57-815A4AC19523", "versionEndExcluding": "2019.2.4", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:*", "matchCriteriaId": "655285C9-9DBC-4DA3-8A53-7D87A2CFFBF7", "versionEndExcluding": "2020.2.6", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:*", "matchCriteriaId": "81E7B898-A0C4-4458-8389-3310A2A889AE", "versionEndExcluding": "2021.1.5", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:revit:2022:*:*:*:*:*:*:*", "matchCriteriaId": "70FD96A0-AC16-4E51-B4C1-6BB14C2D905A", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:storm_and_sanitary_analysis:*:*:*:*:*:*:*:*", "matchCriteriaId": "A7FDF255-2066-4115-83BC-D38DD09A8E6A", "versionEndExcluding": "2020.3.1", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:storm_and_sanitary_analysis:*:*:*:*:*:*:*:*", "matchCriteriaId": "C2591CF9-EA06-4EEC-9A13-80CE6864C08A", "versionEndExcluding": "2021.3.1", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:storm_and_sanitary_analysis:2019:*:*:*:*:*:*:*", "matchCriteriaId": "9AC1FC52-ACBC-4119-B42E-0297375B4522", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:storm_and_sanitary_analysis:2022:*:*:*:*:*:*:*", "matchCriteriaId": "AEAA2573-ABD3-4379-ADBE-A0508D2D38EF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A maliciously crafted TIF, PICT, TGA, or RLC files in Autodesk Image Processing component may be forced to read beyond allocated boundaries when parsing the TIFF, PICT, TGA, or RLC files. This vulnerability may be exploited to execute arbitrary code." }, { "lang": "es", "value": "Los archivos TIF, PICT, TGA o RLC dise\u00f1ados de forma maliciosa en el componente de procesamiento de im\u00e1genes de Autodesk pueden ser forzados a leer m\u00e1s all\u00e1 de los l\u00edmites asignados cuando son analizados los archivos TIFF, PICT, TGA o RLC. Esta vulnerabilidad puede ser explotada para ejecutar c\u00f3digo arbitrario" } ], "id": "CVE-2021-40162", "lastModified": "2024-11-21T06:23:42.010", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-10-07T18:15:14.383", "references": [ { "source": "psirt@autodesk.com", "tags": [ "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0011" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0011" } ], "sourceIdentifier": "psirt@autodesk.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-08-23 20:15
Modified
2024-11-21 04:48
Severity ?
Summary
DLL preloading vulnerability in Autodesk Design Review versions 2011, 2012, 2013, and 2018. An attacker may trick a user into opening a malicious DWF file that may leverage a DLL preloading vulnerability, which may result in code execution.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@autodesk.com | https://www.autodesk.com/trust/security-advisories/adsk-sa-2019-0002 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.autodesk.com/trust/security-advisories/adsk-sa-2019-0002 | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
autodesk | design_review | 2011 | |
autodesk | design_review | 2012 | |
autodesk | design_review | 2013 | |
autodesk | design_review | 2018 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autodesk:design_review:2011:*:*:*:*:*:*:*", "matchCriteriaId": "83CF6CDF-806C-4DC5-B572-C1C2BC2C25F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2012:*:*:*:*:*:*:*", "matchCriteriaId": "2A78B6F8-DF84-4E6C-A247-0F6D2F8CA679", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2013:*:*:*:*:*:*:*", "matchCriteriaId": "DCD2CA9B-16E1-4BE7-A4E1-A9817A503958", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:*:*:*:*:*:*:*", "matchCriteriaId": "7D07C55F-1D23-4E2B-AC1E-67D735F800B7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "DLL preloading vulnerability in Autodesk Design Review versions 2011, 2012, 2013, and 2018. An attacker may trick a user into opening a malicious DWF file that may leverage a DLL preloading vulnerability, which may result in code execution." }, { "lang": "es", "value": "Vulnerabilidad de precarga de DLL en las versiones 2011, 2012, 2013 y 2018 de Autodesk Design Review. Un atacante puede enga\u00f1ar a un usuario para que abra un archivo DWF malicioso que puede aprovechar una vulnerabilidad de precarga de DLL, que puede provocar la ejecuci\u00f3n del c\u00f3digo." } ], "id": "CVE-2019-7362", "lastModified": "2024-11-21T04:48:06.070", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-08-23T20:15:10.503", "references": [ { "source": "psirt@autodesk.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2019-0002" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2019-0002" } ], "sourceIdentifier": "psirt@autodesk.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-427" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-12-23 19:15
Modified
2024-11-21 06:23
Severity ?
Summary
A Memory Corruption vulnerability may lead to code execution through maliciously crafted DLL files through PDFTron earlier than 9.0.7 version.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@autodesk.com | https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0010 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0010 | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
autodesk | revit | * | |
autodesk | revit | * | |
autodesk | revit | * | |
autodesk | navisworks | * | |
autodesk | navisworks | * | |
autodesk | navisworks | * | |
autodesk | navisworks | * | |
autodesk | advance_steel | * | |
autodesk | advance_steel | * | |
autodesk | advance_steel | * | |
autodesk | advance_steel | * | |
autodesk | autocad | * | |
autodesk | autocad | * | |
autodesk | autocad | * | |
autodesk | autocad | * | |
autodesk | autocad_architecture | * | |
autodesk | autocad_architecture | * | |
autodesk | autocad_architecture | * | |
autodesk | autocad_architecture | * | |
autodesk | autocad_electrical | * | |
autodesk | autocad_electrical | * | |
autodesk | autocad_electrical | * | |
autodesk | autocad_electrical | * | |
autodesk | autocad_map_3d | * | |
autodesk | autocad_map_3d | * | |
autodesk | autocad_map_3d | * | |
autodesk | autocad_map_3d | * | |
autodesk | autocad_mechanical | * | |
autodesk | autocad_mechanical | * | |
autodesk | autocad_mechanical | * | |
autodesk | autocad_mechanical | * | |
autodesk | autocad_mep | * | |
autodesk | autocad_mep | * | |
autodesk | autocad_mep | * | |
autodesk | autocad_mep | * | |
autodesk | autocad_plant_3d | * | |
autodesk | autocad_plant_3d | * | |
autodesk | autocad_plant_3d | * | |
autodesk | autocad_plant_3d | * | |
autodesk | autocad_lt | * | |
autodesk | autocad_lt | * | |
autodesk | autocad_lt | * | |
autodesk | autocad_lt | * | |
autodesk | civil_3d | * | |
autodesk | civil_3d | * | |
autodesk | civil_3d | * | |
autodesk | civil_3d | * | |
autodesk | autocad | * | |
autodesk | autocad | 2020 | |
autodesk | autocad | 2021 | |
autodesk | autocad | 2022 | |
autodesk | autocad_lt | * | |
autodesk | autocad_lt | 2020 | |
autodesk | autocad_lt | 2021 | |
autodesk | design_review | 2018 | |
autodesk | design_review | 2018 | |
autodesk | design_review | 2018 | |
autodesk | design_review | 2018 | |
autodesk | design_review | 2018 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:*", "matchCriteriaId": "8579FBF7-DA4C-48D2-8F9A-2D96D1CBF9A0", "versionEndExcluding": "2020.2.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:*", "matchCriteriaId": "26E05A0E-6DBE-4DC0-A491-2A4419EA8835", "versionEndExcluding": "2021.1.6", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:*", "matchCriteriaId": "3F027164-A465-47C3-B92C-56A9D8759905", "versionEndExcluding": "2022.1.2", "versionStartIncluding": "2022", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autodesk:navisworks:*:*:*:*:*:*:*:*", "matchCriteriaId": "9AFAEAD3-55FC-4918-8B74-B78975266C82", "versionEndExcluding": "2019.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:navisworks:*:*:*:*:*:*:*:*", "matchCriteriaId": "FB5C1908-9829-46DE-881F-57277490BE71", "versionEndExcluding": "2020.4", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:navisworks:*:*:*:*:*:*:*:*", "matchCriteriaId": "AE821566-76A8-43D6-9628-B82CFE9FAC19", "versionEndExcluding": "2021.3", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:navisworks:*:*:*:*:*:*:*:*", "matchCriteriaId": "7AAFCE8D-C6FA-4179-BBD8-134F91261FEC", "versionEndExcluding": "2022.2", "versionStartIncluding": "2022", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:*", "matchCriteriaId": "63ABBBCD-A869-47D6-BBBF-30E03F0DCC33", "versionEndExcluding": "2019.1.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:*", "matchCriteriaId": "525AD44E-386E-42C9-8B2E-90F29855DF4A", "versionEndExcluding": "2020.1.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:*", "matchCriteriaId": "7CDC63B1-6EA4-48C6-998A-A86A82A74BD4", "versionEndExcluding": "2021.1.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1BE9431-DC86-4ABB-8EE2-9FADA3B0AEBA", "versionEndExcluding": "2022.1.2", "versionStartIncluding": "2022", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*", "matchCriteriaId": "0203EC49-7943-4759-B62D-334FAF6B7A83", "versionEndExcluding": "2019.1.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*", "matchCriteriaId": "87941CE7-7F89-4A09-BBE8-A0D829273A63", "versionEndExcluding": "2020.1.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*", "matchCriteriaId": "6F98B75B-1471-42A7-BCDA-95F7E65B7FD1", "versionEndExcluding": "2021.1.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C5F50DF-4792-4A29-BB21-5821CA5E3A22", "versionEndExcluding": "2022.1.2", "versionStartIncluding": "2022", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*", "matchCriteriaId": "F1E40E1E-9B7F-4DB9-BB85-2832297135BC", "versionEndExcluding": "2019.1.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*", "matchCriteriaId": "F616B84F-B471-43B9-BC5D-BA6CCE461F56", "versionEndExcluding": "2020.1.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*", "matchCriteriaId": "AD0B37E9-4987-4B96-9B31-6168961E1496", "versionEndExcluding": "2021.1.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9466EE6-83C9-492F-8486-F3E6C1DD9F5A", "versionEndExcluding": "2022.1.2", "versionStartIncluding": "2022", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*", "matchCriteriaId": "D23CAABD-FB77-4365-B7BC-4330315672AA", "versionEndExcluding": "2019.1.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*", "matchCriteriaId": "E716111F-273B-48DF-ADEA-44BADE5E7FEB", "versionEndExcluding": "2020.1.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*", "matchCriteriaId": "71FA0271-BE55-48AD-B88D-34645684E9DE", "versionEndExcluding": "2021.1.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*", "matchCriteriaId": "6DD91E39-A3D8-4806-A778-608FD6C29BB2", "versionEndExcluding": "2022.1.2", "versionStartIncluding": "2022", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "F1BA4DE9-CCBC-4A08-B6C8-F50490BA2283", "versionEndExcluding": "2019.1.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "D9184783-2476-4ED0-9F05-CA2AC68446B3", "versionEndExcluding": "2020.1.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "752B8F1C-54E3-4985-97A4-86FBF13E6BFD", "versionEndExcluding": "2021.1.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "120326C3-E212-4341-A25D-BC3DD50CF228", "versionEndExcluding": "2022.1.2", "versionStartIncluding": "2022", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*", "matchCriteriaId": "8167B5BF-1B06-414F-9088-A126D7C06515", "versionEndExcluding": "2019.1.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*", "matchCriteriaId": "5BAA6D71-2B11-4490-A1C4-652347582EF6", "versionEndExcluding": "2020.1.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*", "matchCriteriaId": "6F78C528-605C-46F3-8CF0-828B682745B3", "versionEndExcluding": "2021.1.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*", "matchCriteriaId": "B117299A-C5FE-419F-9C1C-DF58A2772055", "versionEndExcluding": "2022.1.2", "versionStartIncluding": "2022", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*", "matchCriteriaId": "117BA468-7345-4FEA-A0E3-D4110F7472C3", "versionEndExcluding": "2019.1.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*", "matchCriteriaId": "CBC04C9D-9E69-4CB7-BF7A-D3B8C0670114", "versionEndExcluding": "2020.1.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E140DC9-7000-48ED-A5C7-B23023DFB199", "versionEndExcluding": "2021.1.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*", "matchCriteriaId": "CC178212-E440-46E9-9F00-60A5516D4D72", "versionEndExcluding": "2022.1.2", "versionStartIncluding": "2022", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "7D8E7984-95F9-4FF4-AEBB-D60DF9F83D65", "versionEndExcluding": "2019.1.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "C2A2E5FC-9717-47C1-A223-F90DC572DAB0", "versionEndExcluding": "2020.1.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "984491F0-8303-4C6C-B884-00C032D797DD", "versionEndExcluding": "2021.1.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "7ED0DB1D-6F37-4C1B-B55E-42F3A4E34299", "versionEndExcluding": "2022.1.2", "versionStartIncluding": "2022", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:*:*:*", "matchCriteriaId": "61A9231D-C524-49F5-A8D1-7D70D8034F5D", "versionEndExcluding": "2019.1.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:*:*:*", "matchCriteriaId": "0E59ACB5-8745-46A8-889E-005DEA38925B", "versionEndExcluding": "2020.1.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:*:*:*", "matchCriteriaId": "CFFE146F-4AB2-45B2-9F87-52DD8DC26B85", "versionEndExcluding": "2021.1.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:*:*:*", "matchCriteriaId": "D01E3771-86FD-483D-BCCB-1B1CDD4C482F", "versionEndExcluding": "2022.1.2", "versionStartIncluding": "2022", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "1885BB08-EF19-4780-92F0-1ED4B18F0DB3", "versionEndExcluding": "2019.1.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "EE4E278B-360E-4F00-8479-9531EB417269", "versionEndExcluding": "2020.1.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "577AEF72-23CC-45D9-B391-8A3D79DAB5BA", "versionEndExcluding": "2021.1.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "82C21398-6A86-4E56-A98E-E80FFCC6732E", "versionEndExcluding": "2022.1.2", "versionStartIncluding": "2022", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:macos:*:*", "matchCriteriaId": "9E2CC26F-F7B5-4BA6-A243-B22A37347A42", "versionEndExcluding": "2022.2", "versionStartExcluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2020:*:*:*:*:macos:*:*", "matchCriteriaId": "5EF0E224-30B2-4A78-89A8-036304BBCE48", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2021:*:*:*:*:macos:*:*", "matchCriteriaId": "2FB00DBF-2EC2-433F-9987-189729A46314", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2022:*:*:*:*:macos:*:*", "matchCriteriaId": "68FC54D1-B4FC-404E-9742-72F8340FE3C7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:macos:*:*", "matchCriteriaId": "FF16B57E-C704-43BE-94F5-F09493257323", "versionEndExcluding": "2022.2", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2020:*:*:*:*:macos:*:*", "matchCriteriaId": "FC750C20-98CA-401E-B0AF-5013CE9CB319", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2021:*:*:*:*:macos:*:*", "matchCriteriaId": "164EB7AD-8B17-48E1-A73D-5E5D0012B360", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autodesk:design_review:2018:-:*:*:*:*:*:*", "matchCriteriaId": "213232B9-A40B-436D-A66A-B65C49D59BE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix:*:*:*:*:*:*", "matchCriteriaId": "2D0CF4DC-ACA5-41D0-B28E-CEB5D2C96F71", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix2:*:*:*:*:*:*", "matchCriteriaId": "84ED1789-A17F-48F7-A152-09D2A5C59254", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix3:*:*:*:*:*:*", "matchCriteriaId": "74819924-EB63-4BBF-9986-FEF6100EEE15", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix4:*:*:*:*:*:*", "matchCriteriaId": "100922EF-C773-4798-B352-B16FCAD48F36", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Memory Corruption vulnerability may lead to code execution through maliciously crafted DLL files through PDFTron earlier than 9.0.7 version." }, { "lang": "es", "value": "Una vulnerabilidad de corrupci\u00f3n de memoria puede conducir a la ejecuci\u00f3n de c\u00f3digo a trav\u00e9s de archivos DLL maliciosamente dise\u00f1ados a trav\u00e9s de PDFTron anterior a la versi\u00f3n 9.0.7" } ], "id": "CVE-2021-40161", "lastModified": "2024-11-21T06:23:41.847", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-12-23T19:15:12.167", "references": [ { "source": "psirt@autodesk.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0010" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0010" } ], "sourceIdentifier": "psirt@autodesk.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-10-21 16:15
Modified
2024-11-21 07:25
Severity ?
Summary
A malicious crafted .dwf or .pct file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@autodesk.com | https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004 | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
autodesk | autocad | 2019 | |
autodesk | autocad | 2020 | |
autodesk | autocad | 2021 | |
autodesk | autocad | 2022 | |
autodesk | autocad | 2022 | |
autodesk | autocad | 2023 | |
autodesk | autocad_advance_steel | 2019 | |
autodesk | autocad_advance_steel | 2020 | |
autodesk | autocad_advance_steel | 2021 | |
autodesk | autocad_advance_steel | 2022 | |
autodesk | autocad_advance_steel | 2023 | |
autodesk | autocad_architecture | 2019 | |
autodesk | autocad_architecture | 2020 | |
autodesk | autocad_architecture | 2021 | |
autodesk | autocad_architecture | 2022 | |
autodesk | autocad_architecture | 2023 | |
autodesk | autocad_civil_3d | 2019 | |
autodesk | autocad_civil_3d | 2020 | |
autodesk | autocad_civil_3d | 2021 | |
autodesk | autocad_civil_3d | 2022 | |
autodesk | autocad_civil_3d | 2023 | |
autodesk | autocad_electrical | 2019 | |
autodesk | autocad_electrical | 2020 | |
autodesk | autocad_electrical | 2021 | |
autodesk | autocad_electrical | 2022 | |
autodesk | autocad_electrical | 2023 | |
autodesk | autocad_lt | 2019 | |
autodesk | autocad_lt | 2020 | |
autodesk | autocad_lt | 2021 | |
autodesk | autocad_lt | 2022 | |
autodesk | autocad_lt | 2022 | |
autodesk | autocad_lt | 2023 | |
autodesk | autocad_map_3d | 2019 | |
autodesk | autocad_map_3d | 2020 | |
autodesk | autocad_map_3d | 2021 | |
autodesk | autocad_map_3d | 2022 | |
autodesk | autocad_map_3d | 2023 | |
autodesk | autocad_mechanical | 2019 | |
autodesk | autocad_mechanical | 2020 | |
autodesk | autocad_mechanical | 2021 | |
autodesk | autocad_mechanical | 2022 | |
autodesk | autocad_mechanical | 2023 | |
autodesk | autocad_mep | 2019 | |
autodesk | autocad_mep | 2020 | |
autodesk | autocad_mep | 2021 | |
autodesk | autocad_mep | 2022 | |
autodesk | autocad_mep | 2023 | |
autodesk | autocad_plant_3d | 2019 | |
autodesk | autocad_plant_3d | 2020 | |
autodesk | autocad_plant_3d | 2021 | |
autodesk | autocad_plant_3d | 2022 | |
autodesk | autocad_plant_3d | 2023 | |
autodesk | design_review | 2018 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autodesk:autocad:2019:*:*:*:*:*:*:*", "matchCriteriaId": "411DC826-735A-4BEB-84BE-9250F97F612E", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2020:*:*:*:*:*:*:*", "matchCriteriaId": "E30E2562-D38E-4764-874E-5B2FCF5639E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2021:*:*:*:*:*:*:*", "matchCriteriaId": "88B2C295-D091-4C1D-8285-4309967707BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2022:*:*:*:*:*:*:*", "matchCriteriaId": "EACE09F2-A323-4E4B-9A35-4EBAE3864E6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2022:*:*:*:*:macos:*:*", "matchCriteriaId": "68FC54D1-B4FC-404E-9742-72F8340FE3C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2023:*:*:*:*:*:*:*", "matchCriteriaId": "2241C287-9396-4AD8-B93C-3596394AB2D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:2019:*:*:*:*:*:*:*", "matchCriteriaId": "9B1CAD53-7C63-4E5D-BD2E-364A7A87AA1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:2020:*:*:*:*:*:*:*", "matchCriteriaId": "127F5A79-8E66-4ABD-8D88-8891C6D670D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:2021:*:*:*:*:*:*:*", "matchCriteriaId": "37D8982C-E506-4988-AA97-BDF1B1C3D71A", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:2022:*:*:*:*:*:*:*", "matchCriteriaId": "002AC200-6AE2-4817-91D3-957DA3AC9787", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:2023:*:*:*:*:*:*:*", "matchCriteriaId": "E881C720-E487-463E-A364-A1F9EC3C1D24", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2019:*:*:*:*:*:*:*", "matchCriteriaId": "9275E76C-2A79-462A-A9D3-D0B6BBCDD0CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2020:*:*:*:*:*:*:*", "matchCriteriaId": "B7DFA12E-48C5-47B9-BD9F-1AFACBF4E1EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2021:*:*:*:*:*:*:*", "matchCriteriaId": "535A5D39-1C82-4301-9E5B-C9E0D75F38B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2022:*:*:*:*:*:*:*", "matchCriteriaId": "316615EC-BC9F-4B6A-8163-EBECC480EFDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2023:*:*:*:*:*:*:*", "matchCriteriaId": "546AFB2D-F78A-40C2-AC55-7D07EF0BDC7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2019:*:*:*:*:*:*:*", "matchCriteriaId": "AB3A878B-2142-404F-BCF4-BB508674C6C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2020:*:*:*:*:*:*:*", "matchCriteriaId": "64F2EC88-168D-4DD1-9ADA-3F9FA60D6E35", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2021:*:*:*:*:*:*:*", "matchCriteriaId": "5D73C803-7567-4C1D-B62A-C3C52369022D", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2022:*:*:*:*:*:*:*", "matchCriteriaId": "C5F77B03-3221-4564-B4FF-7BF7EEC1C5B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2023:*:*:*:*:*:*:*", "matchCriteriaId": "C6E001C0-0D7B-44ED-BBE8-E6635C45F988", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2019:*:*:*:*:*:*:*", "matchCriteriaId": "A10DE5AF-1718-4899-9238-CFFDC72D05B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2020:*:*:*:*:*:*:*", "matchCriteriaId": "E388264D-D2D4-4BE4-9097-8F547D73ABE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2021:*:*:*:*:*:*:*", "matchCriteriaId": "16611BAA-C200-4C8B-823F-1AB95F5E1317", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2022:*:*:*:*:*:*:*", "matchCriteriaId": "E2DC5114-48D2-4D85-8E80-B4BCB0FD78F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2023:*:*:*:*:*:*:*", "matchCriteriaId": "A2949D87-C1FA-43C3-8F1F-08ED7A64F302", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2019:*:*:*:*:*:*:*", "matchCriteriaId": "03682B7E-1CF1-4456-A51F-A6ADFC177935", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2020:*:*:*:*:*:*:*", "matchCriteriaId": "371C5F60-4959-40C7-93E1-A01510A95115", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2021:*:*:*:*:*:*:*", "matchCriteriaId": "D83FB4C7-B374-4907-8E2B-EEE61C8339E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2022:*:*:*:*:*:*:*", "matchCriteriaId": "601676EC-2EB4-45D0-B1AE-0980CBD68770", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2022:*:*:*:*:macos:*:*", "matchCriteriaId": "4A2EF334-E4E2-40DA-BD51-B74EE1E0ACCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2023:*:*:*:*:*:*:*", "matchCriteriaId": "99924DDE-3D49-4D37-A361-69B28E7B94A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2019:*:*:*:*:*:*:*", "matchCriteriaId": "04E05510-B21B-4DDD-88D7-CEB8963E1AFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2020:*:*:*:*:*:*:*", "matchCriteriaId": "D4CD010A-FDBC-40F9-95AC-0CD8388B85D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2021:*:*:*:*:*:*:*", "matchCriteriaId": "FC99E0F3-AA11-4390-A7C0-5BBFCDA94E3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2022:*:*:*:*:*:*:*", "matchCriteriaId": "33AA60CF-611C-45FC-92F8-7517D87B1645", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2023:*:*:*:*:*:*:*", "matchCriteriaId": "15A36E1F-964C-4DF2-91D1-D37ECEFC1C86", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2019:*:*:*:*:*:*:*", "matchCriteriaId": "19255CEC-6161-4D44-B87E-52E86DF4FBA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2020:*:*:*:*:*:*:*", "matchCriteriaId": "7147F378-DFB0-48A8-8B05-8777E1CC7F90", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2021:*:*:*:*:*:*:*", "matchCriteriaId": "3B5C858C-4A01-4916-BE3E-B9056D67CF5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2022:*:*:*:*:*:*:*", "matchCriteriaId": "7EB83A4A-D4C2-4509-BD49-15B9BBC7BF97", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2023:*:*:*:*:*:*:*", "matchCriteriaId": "DCF7910A-432F-419E-96E0-25D638A6F298", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2019:*:*:*:*:*:*:*", "matchCriteriaId": "3F608B1C-BA96-4EA8-A540-83870262CBC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2020:*:*:*:*:*:*:*", "matchCriteriaId": "7CFAAD19-6248-42CB-B177-EC2E5141A953", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2021:*:*:*:*:*:*:*", "matchCriteriaId": "1C52D90B-578B-4281-BF0E-B7CDA425ED05", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2022:*:*:*:*:*:*:*", "matchCriteriaId": "4C8AD4F3-AA82-49F5-A18A-85127FDB8B95", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2023:*:*:*:*:*:*:*", "matchCriteriaId": "DF8D9BA5-A043-42DB-A524-6728D3BF2B90", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2019:*:*:*:*:*:*:*", "matchCriteriaId": "4E536B0D-4C95-4589-981A-2F8A6C4B44DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2020:*:*:*:*:*:*:*", "matchCriteriaId": "3FBDD3AC-FA00-462F-AA13-5A75B5D50689", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2021:*:*:*:*:*:*:*", "matchCriteriaId": "73E2E9E8-2269-4729-8D8F-3C26974F5FD2", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2022:*:*:*:*:*:*:*", "matchCriteriaId": "452A1A75-C59A-43AB-9C43-BA49EB95C39C", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2023:*:*:*:*:*:*:*", "matchCriteriaId": "07CB7F37-E6D4-40F3-85BA-EC060E923505", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:-:*:*:*:*:*:*", "matchCriteriaId": "213232B9-A40B-436D-A66A-B65C49D59BE6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A malicious crafted .dwf or .pct file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process." }, { "lang": "es", "value": "Un archivo .dwf o .pct dise\u00f1ado de forma maliciosa cuando es consumido mediante la aplicaci\u00f3n DesignReview.exe podr\u00eda conllevar a una vulnerabilidad de corrupci\u00f3n de memoria por violaci\u00f3n de acceso de escritura. Esta vulnerabilidad, junto con otras, podr\u00eda conllevar a una ejecuci\u00f3n de c\u00f3digo en el contexto del proceso actual" } ], "id": "CVE-2022-42935", "lastModified": "2024-11-21T07:25:37.657", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-10-21T16:15:11.697", "references": [ { "source": "psirt@autodesk.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ], "sourceIdentifier": "psirt@autodesk.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-06-21 15:15
Modified
2024-11-21 06:56
Severity ?
Summary
Autodesk AutoCAD product suite, Revit, Design Review and Navisworks releases using PDFTron prior to 9.1.17 version may be used to write beyond the allocated buffer while parsing PDF files. This vulnerability may be exploited to execute arbitrary code.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
autodesk | 3ds_max | 2021 | |
autodesk | 3ds_max | 2022 | |
autodesk | advance_steel | 2019 | |
autodesk | advance_steel | 2020 | |
autodesk | advance_steel | 2021 | |
autodesk | advance_steel | 2022 | |
autodesk | autocad | 2019 | |
autodesk | autocad | 2020 | |
autodesk | autocad | 2021 | |
autodesk | autocad | 2022 | |
autodesk | autocad | 2022 | |
autodesk | autocad_architecture | 2019 | |
autodesk | autocad_architecture | 2020 | |
autodesk | autocad_architecture | 2021 | |
autodesk | autocad_architecture | 2022 | |
autodesk | autocad_civil_3d | 2019 | |
autodesk | autocad_civil_3d | 2020 | |
autodesk | autocad_civil_3d | 2021 | |
autodesk | autocad_civil_3d | 2022 | |
autodesk | autocad_electrical | 2019 | |
autodesk | autocad_electrical | 2020 | |
autodesk | autocad_electrical | 2021 | |
autodesk | autocad_electrical | 2022 | |
autodesk | autocad_lt | 2019 | |
autodesk | autocad_lt | 2020 | |
autodesk | autocad_lt | 2021 | |
autodesk | autocad_lt | 2022 | |
autodesk | autocad_lt | 2022 | |
autodesk | autocad_map_3d | 2019 | |
autodesk | autocad_map_3d | 2020 | |
autodesk | autocad_map_3d | 2021 | |
autodesk | autocad_map_3d | 2022 | |
autodesk | autocad_mechanical | 2019 | |
autodesk | autocad_mechanical | 2020 | |
autodesk | autocad_mechanical | 2021 | |
autodesk | autocad_mechanical | 2022 | |
autodesk | autocad_mep | 2019 | |
autodesk | autocad_mep | 2020 | |
autodesk | autocad_mep | 2021 | |
autodesk | autocad_mep | 2022 | |
autodesk | autocad_plant_3d | 2019 | |
autodesk | autocad_plant_3d | 2020 | |
autodesk | autocad_plant_3d | 2021 | |
autodesk | autocad_plant_3d | 2022 | |
autodesk | design_review | 2018 | |
autodesk | navisworks | 2019 | |
autodesk | navisworks | 2020 | |
autodesk | navisworks | 2022 | |
autodesk | revit | 2020 | |
autodesk | revit | 2021 | |
autodesk | revit | 2022 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autodesk:3ds_max:2021:*:*:*:*:*:*:*", "matchCriteriaId": "88A89032-1BA1-4657-98F6-E2ECB19BB4E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:3ds_max:2022:*:*:*:*:*:*:*", "matchCriteriaId": "887292AA-AC0F-4931-B55B-5FAAA127E3D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:advance_steel:2019:*:*:*:*:*:*:*", "matchCriteriaId": "963B02A8-97DE-4C10-9AE1-3DA4FBC9AF9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:advance_steel:2020:*:*:*:*:*:*:*", "matchCriteriaId": "8C4543D1-94E4-4470-91BF-6F3141FD9DAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:advance_steel:2021:*:*:*:*:*:*:*", "matchCriteriaId": "AB44E46E-C1FF-4642-9F0D-FEE599F12508", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:advance_steel:2022:*:*:*:*:*:*:*", "matchCriteriaId": "FABA4668-B759-4EF8-B4F7-DD824A5BD38B", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2019:*:*:*:*:*:*:*", "matchCriteriaId": "411DC826-735A-4BEB-84BE-9250F97F612E", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2020:*:*:*:*:*:*:*", "matchCriteriaId": "E30E2562-D38E-4764-874E-5B2FCF5639E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2021:*:*:*:*:*:*:*", "matchCriteriaId": "88B2C295-D091-4C1D-8285-4309967707BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2022:*:*:*:*:*:*:*", "matchCriteriaId": "EACE09F2-A323-4E4B-9A35-4EBAE3864E6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2022:*:*:*:*:macos:*:*", "matchCriteriaId": "68FC54D1-B4FC-404E-9742-72F8340FE3C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2019:*:*:*:*:*:*:*", "matchCriteriaId": "9275E76C-2A79-462A-A9D3-D0B6BBCDD0CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2020:*:*:*:*:*:*:*", "matchCriteriaId": "B7DFA12E-48C5-47B9-BD9F-1AFACBF4E1EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2021:*:*:*:*:*:*:*", "matchCriteriaId": "535A5D39-1C82-4301-9E5B-C9E0D75F38B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2022:*:*:*:*:*:*:*", "matchCriteriaId": "316615EC-BC9F-4B6A-8163-EBECC480EFDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2019:*:*:*:*:*:*:*", "matchCriteriaId": "AB3A878B-2142-404F-BCF4-BB508674C6C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2020:*:*:*:*:*:*:*", "matchCriteriaId": "64F2EC88-168D-4DD1-9ADA-3F9FA60D6E35", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2021:*:*:*:*:*:*:*", "matchCriteriaId": "5D73C803-7567-4C1D-B62A-C3C52369022D", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2022:*:*:*:*:*:*:*", "matchCriteriaId": "C5F77B03-3221-4564-B4FF-7BF7EEC1C5B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2019:*:*:*:*:*:*:*", "matchCriteriaId": "A10DE5AF-1718-4899-9238-CFFDC72D05B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2020:*:*:*:*:*:*:*", "matchCriteriaId": "E388264D-D2D4-4BE4-9097-8F547D73ABE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2021:*:*:*:*:*:*:*", "matchCriteriaId": "16611BAA-C200-4C8B-823F-1AB95F5E1317", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2022:*:*:*:*:*:*:*", "matchCriteriaId": "E2DC5114-48D2-4D85-8E80-B4BCB0FD78F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2019:*:*:*:*:*:*:*", "matchCriteriaId": "03682B7E-1CF1-4456-A51F-A6ADFC177935", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2020:*:*:*:*:*:*:*", "matchCriteriaId": "371C5F60-4959-40C7-93E1-A01510A95115", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2021:*:*:*:*:*:*:*", "matchCriteriaId": "D83FB4C7-B374-4907-8E2B-EEE61C8339E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2022:*:*:*:*:*:*:*", "matchCriteriaId": "601676EC-2EB4-45D0-B1AE-0980CBD68770", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2022:*:*:*:*:macos:*:*", "matchCriteriaId": "4A2EF334-E4E2-40DA-BD51-B74EE1E0ACCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2019:*:*:*:*:*:*:*", "matchCriteriaId": "04E05510-B21B-4DDD-88D7-CEB8963E1AFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2020:*:*:*:*:*:*:*", "matchCriteriaId": "D4CD010A-FDBC-40F9-95AC-0CD8388B85D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2021:*:*:*:*:*:*:*", "matchCriteriaId": "FC99E0F3-AA11-4390-A7C0-5BBFCDA94E3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2022:*:*:*:*:*:*:*", "matchCriteriaId": "33AA60CF-611C-45FC-92F8-7517D87B1645", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2019:*:*:*:*:*:*:*", "matchCriteriaId": "19255CEC-6161-4D44-B87E-52E86DF4FBA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2020:*:*:*:*:*:*:*", "matchCriteriaId": "7147F378-DFB0-48A8-8B05-8777E1CC7F90", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2021:*:*:*:*:*:*:*", "matchCriteriaId": "3B5C858C-4A01-4916-BE3E-B9056D67CF5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2022:*:*:*:*:*:*:*", "matchCriteriaId": "7EB83A4A-D4C2-4509-BD49-15B9BBC7BF97", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2019:*:*:*:*:*:*:*", "matchCriteriaId": "3F608B1C-BA96-4EA8-A540-83870262CBC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2020:*:*:*:*:*:*:*", "matchCriteriaId": "7CFAAD19-6248-42CB-B177-EC2E5141A953", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2021:*:*:*:*:*:*:*", "matchCriteriaId": "1C52D90B-578B-4281-BF0E-B7CDA425ED05", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2022:*:*:*:*:*:*:*", "matchCriteriaId": "4C8AD4F3-AA82-49F5-A18A-85127FDB8B95", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2019:*:*:*:*:*:*:*", "matchCriteriaId": "4E536B0D-4C95-4589-981A-2F8A6C4B44DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2020:*:*:*:*:*:*:*", "matchCriteriaId": "3FBDD3AC-FA00-462F-AA13-5A75B5D50689", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2021:*:*:*:*:*:*:*", "matchCriteriaId": "73E2E9E8-2269-4729-8D8F-3C26974F5FD2", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2022:*:*:*:*:*:*:*", "matchCriteriaId": "452A1A75-C59A-43AB-9C43-BA49EB95C39C", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:-:*:*:*:*:*:*", "matchCriteriaId": "213232B9-A40B-436D-A66A-B65C49D59BE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:navisworks:2019:*:*:*:*:*:*:*", "matchCriteriaId": "F8EB8353-CA0F-4B38-9427-56C845696A7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:navisworks:2020:*:*:*:*:*:*:*", "matchCriteriaId": "3B3A9D11-51D7-4384-A6CF-B1AE46625E66", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:navisworks:2022:*:*:*:*:*:*:*", "matchCriteriaId": "8694D891-A923-4B62-A508-77E6EBC54646", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:revit:2020:*:*:*:*:*:*:*", "matchCriteriaId": "8A183FC7-49B7-4475-A580-E87B68690997", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:revit:2021:*:*:*:*:*:*:*", "matchCriteriaId": "E9CFAE69-D0D3-4850-8752-DD2DC3FF51CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:revit:2022:*:*:*:*:*:*:*", "matchCriteriaId": "70FD96A0-AC16-4E51-B4C1-6BB14C2D905A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Autodesk AutoCAD product suite, Revit, Design Review and Navisworks releases using PDFTron prior to 9.1.17 version may be used to write beyond the allocated buffer while parsing PDF files. This vulnerability may be exploited to execute arbitrary code." }, { "lang": "es", "value": "Las versiones del paquete de productos AutoCAD, Revit, Design Review y Navisworks que usan PDFTron versiones anteriores a 9.1.17, pueden escribir m\u00e1s all\u00e1 del b\u00fafer asignado mientras analizan los archivos PDF. Esta vulnerabilidad puede ser explotada para ejecutar c\u00f3digo arbitrario" } ], "id": "CVE-2022-27871", "lastModified": "2024-11-21T06:56:22.103", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-06-21T15:15:08.863", "references": [ { "source": "psirt@autodesk.com", "tags": [ "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0011" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0011" } ], "sourceIdentifier": "psirt@autodesk.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-770" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-10-21 16:15
Modified
2024-11-21 07:23
Severity ?
Summary
A malicious crafted .dwf or .pct file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@autodesk.com | https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004 | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
autodesk | autocad | 2019 | |
autodesk | autocad | 2020 | |
autodesk | autocad | 2021 | |
autodesk | autocad | 2022 | |
autodesk | autocad | 2022 | |
autodesk | autocad | 2023 | |
autodesk | autocad_advance_steel | 2019 | |
autodesk | autocad_advance_steel | 2020 | |
autodesk | autocad_advance_steel | 2021 | |
autodesk | autocad_advance_steel | 2022 | |
autodesk | autocad_advance_steel | 2023 | |
autodesk | autocad_architecture | 2019 | |
autodesk | autocad_architecture | 2020 | |
autodesk | autocad_architecture | 2021 | |
autodesk | autocad_architecture | 2022 | |
autodesk | autocad_architecture | 2023 | |
autodesk | autocad_civil_3d | 2019 | |
autodesk | autocad_civil_3d | 2020 | |
autodesk | autocad_civil_3d | 2021 | |
autodesk | autocad_civil_3d | 2022 | |
autodesk | autocad_civil_3d | 2023 | |
autodesk | autocad_electrical | 2019 | |
autodesk | autocad_electrical | 2020 | |
autodesk | autocad_electrical | 2021 | |
autodesk | autocad_electrical | 2022 | |
autodesk | autocad_electrical | 2023 | |
autodesk | autocad_lt | 2019 | |
autodesk | autocad_lt | 2020 | |
autodesk | autocad_lt | 2021 | |
autodesk | autocad_lt | 2022 | |
autodesk | autocad_lt | 2022 | |
autodesk | autocad_lt | 2023 | |
autodesk | autocad_map_3d | 2019 | |
autodesk | autocad_map_3d | 2020 | |
autodesk | autocad_map_3d | 2021 | |
autodesk | autocad_map_3d | 2022 | |
autodesk | autocad_map_3d | 2023 | |
autodesk | autocad_mechanical | 2019 | |
autodesk | autocad_mechanical | 2020 | |
autodesk | autocad_mechanical | 2021 | |
autodesk | autocad_mechanical | 2022 | |
autodesk | autocad_mechanical | 2023 | |
autodesk | autocad_mep | 2019 | |
autodesk | autocad_mep | 2020 | |
autodesk | autocad_mep | 2021 | |
autodesk | autocad_mep | 2022 | |
autodesk | autocad_mep | 2023 | |
autodesk | autocad_plant_3d | 2019 | |
autodesk | autocad_plant_3d | 2020 | |
autodesk | autocad_plant_3d | 2021 | |
autodesk | autocad_plant_3d | 2022 | |
autodesk | autocad_plant_3d | 2023 | |
autodesk | design_review | 2018 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autodesk:autocad:2019:*:*:*:*:*:*:*", "matchCriteriaId": "411DC826-735A-4BEB-84BE-9250F97F612E", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2020:*:*:*:*:*:*:*", "matchCriteriaId": "E30E2562-D38E-4764-874E-5B2FCF5639E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2021:*:*:*:*:*:*:*", "matchCriteriaId": "88B2C295-D091-4C1D-8285-4309967707BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2022:*:*:*:*:*:*:*", "matchCriteriaId": "EACE09F2-A323-4E4B-9A35-4EBAE3864E6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2022:*:*:*:*:macos:*:*", "matchCriteriaId": "68FC54D1-B4FC-404E-9742-72F8340FE3C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2023:*:*:*:*:*:*:*", "matchCriteriaId": "2241C287-9396-4AD8-B93C-3596394AB2D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:2019:*:*:*:*:*:*:*", "matchCriteriaId": "9B1CAD53-7C63-4E5D-BD2E-364A7A87AA1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:2020:*:*:*:*:*:*:*", "matchCriteriaId": "127F5A79-8E66-4ABD-8D88-8891C6D670D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:2021:*:*:*:*:*:*:*", "matchCriteriaId": "37D8982C-E506-4988-AA97-BDF1B1C3D71A", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:2022:*:*:*:*:*:*:*", "matchCriteriaId": "002AC200-6AE2-4817-91D3-957DA3AC9787", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:2023:*:*:*:*:*:*:*", "matchCriteriaId": "E881C720-E487-463E-A364-A1F9EC3C1D24", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2019:*:*:*:*:*:*:*", "matchCriteriaId": "9275E76C-2A79-462A-A9D3-D0B6BBCDD0CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2020:*:*:*:*:*:*:*", "matchCriteriaId": "B7DFA12E-48C5-47B9-BD9F-1AFACBF4E1EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2021:*:*:*:*:*:*:*", "matchCriteriaId": "535A5D39-1C82-4301-9E5B-C9E0D75F38B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2022:*:*:*:*:*:*:*", "matchCriteriaId": "316615EC-BC9F-4B6A-8163-EBECC480EFDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2023:*:*:*:*:*:*:*", "matchCriteriaId": "546AFB2D-F78A-40C2-AC55-7D07EF0BDC7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2019:*:*:*:*:*:*:*", "matchCriteriaId": "AB3A878B-2142-404F-BCF4-BB508674C6C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2020:*:*:*:*:*:*:*", "matchCriteriaId": "64F2EC88-168D-4DD1-9ADA-3F9FA60D6E35", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2021:*:*:*:*:*:*:*", "matchCriteriaId": "5D73C803-7567-4C1D-B62A-C3C52369022D", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2022:*:*:*:*:*:*:*", "matchCriteriaId": "C5F77B03-3221-4564-B4FF-7BF7EEC1C5B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2023:*:*:*:*:*:*:*", "matchCriteriaId": "C6E001C0-0D7B-44ED-BBE8-E6635C45F988", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2019:*:*:*:*:*:*:*", "matchCriteriaId": "A10DE5AF-1718-4899-9238-CFFDC72D05B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2020:*:*:*:*:*:*:*", "matchCriteriaId": "E388264D-D2D4-4BE4-9097-8F547D73ABE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2021:*:*:*:*:*:*:*", "matchCriteriaId": "16611BAA-C200-4C8B-823F-1AB95F5E1317", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2022:*:*:*:*:*:*:*", "matchCriteriaId": "E2DC5114-48D2-4D85-8E80-B4BCB0FD78F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2023:*:*:*:*:*:*:*", "matchCriteriaId": "A2949D87-C1FA-43C3-8F1F-08ED7A64F302", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2019:*:*:*:*:*:*:*", "matchCriteriaId": "03682B7E-1CF1-4456-A51F-A6ADFC177935", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2020:*:*:*:*:*:*:*", "matchCriteriaId": "371C5F60-4959-40C7-93E1-A01510A95115", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2021:*:*:*:*:*:*:*", "matchCriteriaId": "D83FB4C7-B374-4907-8E2B-EEE61C8339E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2022:*:*:*:*:*:*:*", "matchCriteriaId": "601676EC-2EB4-45D0-B1AE-0980CBD68770", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2022:*:*:*:*:macos:*:*", "matchCriteriaId": "4A2EF334-E4E2-40DA-BD51-B74EE1E0ACCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2023:*:*:*:*:*:*:*", "matchCriteriaId": "99924DDE-3D49-4D37-A361-69B28E7B94A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2019:*:*:*:*:*:*:*", "matchCriteriaId": "04E05510-B21B-4DDD-88D7-CEB8963E1AFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2020:*:*:*:*:*:*:*", "matchCriteriaId": "D4CD010A-FDBC-40F9-95AC-0CD8388B85D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2021:*:*:*:*:*:*:*", "matchCriteriaId": "FC99E0F3-AA11-4390-A7C0-5BBFCDA94E3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2022:*:*:*:*:*:*:*", "matchCriteriaId": "33AA60CF-611C-45FC-92F8-7517D87B1645", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2023:*:*:*:*:*:*:*", "matchCriteriaId": "15A36E1F-964C-4DF2-91D1-D37ECEFC1C86", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2019:*:*:*:*:*:*:*", "matchCriteriaId": "19255CEC-6161-4D44-B87E-52E86DF4FBA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2020:*:*:*:*:*:*:*", "matchCriteriaId": "7147F378-DFB0-48A8-8B05-8777E1CC7F90", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2021:*:*:*:*:*:*:*", "matchCriteriaId": "3B5C858C-4A01-4916-BE3E-B9056D67CF5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2022:*:*:*:*:*:*:*", "matchCriteriaId": "7EB83A4A-D4C2-4509-BD49-15B9BBC7BF97", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2023:*:*:*:*:*:*:*", "matchCriteriaId": "DCF7910A-432F-419E-96E0-25D638A6F298", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2019:*:*:*:*:*:*:*", "matchCriteriaId": "3F608B1C-BA96-4EA8-A540-83870262CBC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2020:*:*:*:*:*:*:*", "matchCriteriaId": "7CFAAD19-6248-42CB-B177-EC2E5141A953", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2021:*:*:*:*:*:*:*", "matchCriteriaId": "1C52D90B-578B-4281-BF0E-B7CDA425ED05", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2022:*:*:*:*:*:*:*", "matchCriteriaId": "4C8AD4F3-AA82-49F5-A18A-85127FDB8B95", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2023:*:*:*:*:*:*:*", "matchCriteriaId": "DF8D9BA5-A043-42DB-A524-6728D3BF2B90", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2019:*:*:*:*:*:*:*", "matchCriteriaId": "4E536B0D-4C95-4589-981A-2F8A6C4B44DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2020:*:*:*:*:*:*:*", "matchCriteriaId": "3FBDD3AC-FA00-462F-AA13-5A75B5D50689", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2021:*:*:*:*:*:*:*", "matchCriteriaId": "73E2E9E8-2269-4729-8D8F-3C26974F5FD2", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2022:*:*:*:*:*:*:*", "matchCriteriaId": "452A1A75-C59A-43AB-9C43-BA49EB95C39C", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2023:*:*:*:*:*:*:*", "matchCriteriaId": "07CB7F37-E6D4-40F3-85BA-EC060E923505", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:-:*:*:*:*:*:*", "matchCriteriaId": "213232B9-A40B-436D-A66A-B65C49D59BE6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A malicious crafted .dwf or .pct file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process." }, { "lang": "es", "value": "Un archivo .dwf o .pct dise\u00f1ado de forma maliciosa cuando es consumido mediante la aplicaci\u00f3n DesignReview.exe podr\u00eda conllevar a una vulnerabilidad de corrupci\u00f3n de memoria por violaci\u00f3n de acceso de escritura. Esta vulnerabilidad, junto con otras, podr\u00eda conllevar a una ejecuci\u00f3n de c\u00f3digo en el contexto del proceso actual" } ], "id": "CVE-2022-41310", "lastModified": "2024-11-21T07:23:01.147", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-10-21T16:15:11.507", "references": [ { "source": "psirt@autodesk.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ], "sourceIdentifier": "psirt@autodesk.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-10-21 16:15
Modified
2024-11-21 07:25
Severity ?
Summary
A malicious crafted .dwf or .pct file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@autodesk.com | https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004 | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
autodesk | autocad | 2019 | |
autodesk | autocad | 2020 | |
autodesk | autocad | 2021 | |
autodesk | autocad | 2022 | |
autodesk | autocad | 2022 | |
autodesk | autocad | 2023 | |
autodesk | autocad_advance_steel | 2019 | |
autodesk | autocad_advance_steel | 2020 | |
autodesk | autocad_advance_steel | 2021 | |
autodesk | autocad_advance_steel | 2022 | |
autodesk | autocad_advance_steel | 2023 | |
autodesk | autocad_architecture | 2019 | |
autodesk | autocad_architecture | 2020 | |
autodesk | autocad_architecture | 2021 | |
autodesk | autocad_architecture | 2022 | |
autodesk | autocad_architecture | 2023 | |
autodesk | autocad_civil_3d | 2019 | |
autodesk | autocad_civil_3d | 2020 | |
autodesk | autocad_civil_3d | 2021 | |
autodesk | autocad_civil_3d | 2022 | |
autodesk | autocad_civil_3d | 2023 | |
autodesk | autocad_electrical | 2019 | |
autodesk | autocad_electrical | 2020 | |
autodesk | autocad_electrical | 2021 | |
autodesk | autocad_electrical | 2022 | |
autodesk | autocad_electrical | 2023 | |
autodesk | autocad_lt | 2019 | |
autodesk | autocad_lt | 2020 | |
autodesk | autocad_lt | 2021 | |
autodesk | autocad_lt | 2022 | |
autodesk | autocad_lt | 2022 | |
autodesk | autocad_lt | 2023 | |
autodesk | autocad_map_3d | 2019 | |
autodesk | autocad_map_3d | 2020 | |
autodesk | autocad_map_3d | 2021 | |
autodesk | autocad_map_3d | 2022 | |
autodesk | autocad_map_3d | 2023 | |
autodesk | autocad_mechanical | 2019 | |
autodesk | autocad_mechanical | 2020 | |
autodesk | autocad_mechanical | 2021 | |
autodesk | autocad_mechanical | 2022 | |
autodesk | autocad_mechanical | 2023 | |
autodesk | autocad_mep | 2019 | |
autodesk | autocad_mep | 2020 | |
autodesk | autocad_mep | 2021 | |
autodesk | autocad_mep | 2022 | |
autodesk | autocad_mep | 2023 | |
autodesk | autocad_plant_3d | 2019 | |
autodesk | autocad_plant_3d | 2020 | |
autodesk | autocad_plant_3d | 2021 | |
autodesk | autocad_plant_3d | 2022 | |
autodesk | autocad_plant_3d | 2023 | |
autodesk | design_review | 2018 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autodesk:autocad:2019:*:*:*:*:*:*:*", "matchCriteriaId": "411DC826-735A-4BEB-84BE-9250F97F612E", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2020:*:*:*:*:*:*:*", "matchCriteriaId": "E30E2562-D38E-4764-874E-5B2FCF5639E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2021:*:*:*:*:*:*:*", "matchCriteriaId": "88B2C295-D091-4C1D-8285-4309967707BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2022:*:*:*:*:*:*:*", "matchCriteriaId": "EACE09F2-A323-4E4B-9A35-4EBAE3864E6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2022:*:*:*:*:macos:*:*", "matchCriteriaId": "68FC54D1-B4FC-404E-9742-72F8340FE3C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2023:*:*:*:*:*:*:*", "matchCriteriaId": "2241C287-9396-4AD8-B93C-3596394AB2D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:2019:*:*:*:*:*:*:*", "matchCriteriaId": "9B1CAD53-7C63-4E5D-BD2E-364A7A87AA1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:2020:*:*:*:*:*:*:*", "matchCriteriaId": "127F5A79-8E66-4ABD-8D88-8891C6D670D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:2021:*:*:*:*:*:*:*", "matchCriteriaId": "37D8982C-E506-4988-AA97-BDF1B1C3D71A", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:2022:*:*:*:*:*:*:*", "matchCriteriaId": "002AC200-6AE2-4817-91D3-957DA3AC9787", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:2023:*:*:*:*:*:*:*", "matchCriteriaId": "E881C720-E487-463E-A364-A1F9EC3C1D24", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2019:*:*:*:*:*:*:*", "matchCriteriaId": "9275E76C-2A79-462A-A9D3-D0B6BBCDD0CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2020:*:*:*:*:*:*:*", "matchCriteriaId": "B7DFA12E-48C5-47B9-BD9F-1AFACBF4E1EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2021:*:*:*:*:*:*:*", "matchCriteriaId": "535A5D39-1C82-4301-9E5B-C9E0D75F38B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2022:*:*:*:*:*:*:*", "matchCriteriaId": "316615EC-BC9F-4B6A-8163-EBECC480EFDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2023:*:*:*:*:*:*:*", "matchCriteriaId": "546AFB2D-F78A-40C2-AC55-7D07EF0BDC7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2019:*:*:*:*:*:*:*", "matchCriteriaId": "AB3A878B-2142-404F-BCF4-BB508674C6C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2020:*:*:*:*:*:*:*", "matchCriteriaId": "64F2EC88-168D-4DD1-9ADA-3F9FA60D6E35", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2021:*:*:*:*:*:*:*", "matchCriteriaId": "5D73C803-7567-4C1D-B62A-C3C52369022D", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2022:*:*:*:*:*:*:*", "matchCriteriaId": "C5F77B03-3221-4564-B4FF-7BF7EEC1C5B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2023:*:*:*:*:*:*:*", "matchCriteriaId": "C6E001C0-0D7B-44ED-BBE8-E6635C45F988", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2019:*:*:*:*:*:*:*", "matchCriteriaId": "A10DE5AF-1718-4899-9238-CFFDC72D05B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2020:*:*:*:*:*:*:*", "matchCriteriaId": "E388264D-D2D4-4BE4-9097-8F547D73ABE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2021:*:*:*:*:*:*:*", "matchCriteriaId": "16611BAA-C200-4C8B-823F-1AB95F5E1317", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2022:*:*:*:*:*:*:*", "matchCriteriaId": "E2DC5114-48D2-4D85-8E80-B4BCB0FD78F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2023:*:*:*:*:*:*:*", "matchCriteriaId": "A2949D87-C1FA-43C3-8F1F-08ED7A64F302", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2019:*:*:*:*:*:*:*", "matchCriteriaId": "03682B7E-1CF1-4456-A51F-A6ADFC177935", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2020:*:*:*:*:*:*:*", "matchCriteriaId": "371C5F60-4959-40C7-93E1-A01510A95115", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2021:*:*:*:*:*:*:*", "matchCriteriaId": "D83FB4C7-B374-4907-8E2B-EEE61C8339E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2022:*:*:*:*:*:*:*", "matchCriteriaId": "601676EC-2EB4-45D0-B1AE-0980CBD68770", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2022:*:*:*:*:macos:*:*", "matchCriteriaId": "4A2EF334-E4E2-40DA-BD51-B74EE1E0ACCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2023:*:*:*:*:*:*:*", "matchCriteriaId": "99924DDE-3D49-4D37-A361-69B28E7B94A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2019:*:*:*:*:*:*:*", "matchCriteriaId": "04E05510-B21B-4DDD-88D7-CEB8963E1AFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2020:*:*:*:*:*:*:*", "matchCriteriaId": "D4CD010A-FDBC-40F9-95AC-0CD8388B85D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2021:*:*:*:*:*:*:*", "matchCriteriaId": "FC99E0F3-AA11-4390-A7C0-5BBFCDA94E3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2022:*:*:*:*:*:*:*", "matchCriteriaId": "33AA60CF-611C-45FC-92F8-7517D87B1645", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2023:*:*:*:*:*:*:*", "matchCriteriaId": "15A36E1F-964C-4DF2-91D1-D37ECEFC1C86", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2019:*:*:*:*:*:*:*", "matchCriteriaId": "19255CEC-6161-4D44-B87E-52E86DF4FBA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2020:*:*:*:*:*:*:*", "matchCriteriaId": "7147F378-DFB0-48A8-8B05-8777E1CC7F90", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2021:*:*:*:*:*:*:*", "matchCriteriaId": "3B5C858C-4A01-4916-BE3E-B9056D67CF5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2022:*:*:*:*:*:*:*", "matchCriteriaId": "7EB83A4A-D4C2-4509-BD49-15B9BBC7BF97", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2023:*:*:*:*:*:*:*", "matchCriteriaId": "DCF7910A-432F-419E-96E0-25D638A6F298", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2019:*:*:*:*:*:*:*", "matchCriteriaId": "3F608B1C-BA96-4EA8-A540-83870262CBC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2020:*:*:*:*:*:*:*", "matchCriteriaId": "7CFAAD19-6248-42CB-B177-EC2E5141A953", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2021:*:*:*:*:*:*:*", "matchCriteriaId": "1C52D90B-578B-4281-BF0E-B7CDA425ED05", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2022:*:*:*:*:*:*:*", "matchCriteriaId": "4C8AD4F3-AA82-49F5-A18A-85127FDB8B95", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2023:*:*:*:*:*:*:*", "matchCriteriaId": "DF8D9BA5-A043-42DB-A524-6728D3BF2B90", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2019:*:*:*:*:*:*:*", "matchCriteriaId": "4E536B0D-4C95-4589-981A-2F8A6C4B44DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2020:*:*:*:*:*:*:*", "matchCriteriaId": "3FBDD3AC-FA00-462F-AA13-5A75B5D50689", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2021:*:*:*:*:*:*:*", "matchCriteriaId": "73E2E9E8-2269-4729-8D8F-3C26974F5FD2", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2022:*:*:*:*:*:*:*", "matchCriteriaId": "452A1A75-C59A-43AB-9C43-BA49EB95C39C", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2023:*:*:*:*:*:*:*", "matchCriteriaId": "07CB7F37-E6D4-40F3-85BA-EC060E923505", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:-:*:*:*:*:*:*", "matchCriteriaId": "213232B9-A40B-436D-A66A-B65C49D59BE6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A malicious crafted .dwf or .pct file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process." }, { "lang": "es", "value": "Un archivo .dwf o .pct dise\u00f1ado de forma maliciosa cuando es consumido mediante la aplicaci\u00f3n DesignReview.exe podr\u00eda conllevar a una vulnerabilidad de corrupci\u00f3n de memoria por violaci\u00f3n de acceso de escritura. Esta vulnerabilidad, junto con otras, podr\u00eda conllevar a una ejecuci\u00f3n de c\u00f3digo en el contexto del proceso actual" } ], "id": "CVE-2022-42937", "lastModified": "2024-11-21T07:25:37.957", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-10-21T16:15:11.780", "references": [ { "source": "psirt@autodesk.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ], "sourceIdentifier": "psirt@autodesk.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-04-18 17:15
Modified
2024-11-21 06:55
Severity ?
Summary
A malicious crafted .dwf or .pct file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
autodesk | design_review | 2011 | |
autodesk | design_review | 2012 | |
autodesk | design_review | 2013 | |
autodesk | design_review | 2017 | |
autodesk | design_review | 2018 | |
autodesk | design_review | 2018 | |
autodesk | design_review | 2018 | |
autodesk | design_review | 2018 | |
autodesk | design_review | 2018 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autodesk:design_review:2011:*:*:*:*:*:*:*", "matchCriteriaId": "83CF6CDF-806C-4DC5-B572-C1C2BC2C25F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2012:*:*:*:*:*:*:*", "matchCriteriaId": "2A78B6F8-DF84-4E6C-A247-0F6D2F8CA679", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2013:*:*:*:*:*:*:*", "matchCriteriaId": "DCD2CA9B-16E1-4BE7-A4E1-A9817A503958", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2017:*:*:*:*:*:*:*", "matchCriteriaId": "31F2529F-ECF0-4568-BBDC-82B396A52332", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:-:*:*:*:*:*:*", "matchCriteriaId": "213232B9-A40B-436D-A66A-B65C49D59BE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix:*:*:*:*:*:*", "matchCriteriaId": "2D0CF4DC-ACA5-41D0-B28E-CEB5D2C96F71", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix2:*:*:*:*:*:*", "matchCriteriaId": "84ED1789-A17F-48F7-A152-09D2A5C59254", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix3:*:*:*:*:*:*", "matchCriteriaId": "74819924-EB63-4BBF-9986-FEF6100EEE15", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix4:*:*:*:*:*:*", "matchCriteriaId": "100922EF-C773-4798-B352-B16FCAD48F36", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A malicious crafted .dwf or .pct file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process." }, { "lang": "es", "value": "Un archivo .dwf o .pct malicioso cuando se consume a trav\u00e9s de la aplicaci\u00f3n DesignReview.exe podr\u00eda llevar a una vulnerabilidad de corrupci\u00f3n de memoria por violaci\u00f3n de acceso de escritura. Esta vulnerabilidad, junto con otras, podr\u00eda conducir a la ejecuci\u00f3n de c\u00f3digo en el contexto del proceso actual" } ], "id": "CVE-2022-27525", "lastModified": "2024-11-21T06:55:52.927", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-04-18T17:15:16.813", "references": [ { "source": "psirt@autodesk.com", "tags": [ "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ], "sourceIdentifier": "psirt@autodesk.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-10-07 18:15
Modified
2024-11-21 06:23
Severity ?
Summary
A heap-based buffer overflow could occur while parsing TIFF, PICT, TGA, or RLC files. This vulnerability may be exploited to execute arbitrary code.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
autodesk | autocad | * | |
autodesk | autocad | * | |
autodesk | autocad | * | |
autodesk | autocad | * | |
autodesk | autocad_advance_steel | * | |
autodesk | autocad_advance_steel | * | |
autodesk | autocad_advance_steel | * | |
autodesk | autocad_advance_steel | * | |
autodesk | autocad_architecture | * | |
autodesk | autocad_architecture | * | |
autodesk | autocad_architecture | * | |
autodesk | autocad_architecture | * | |
autodesk | autocad_civil_3d | * | |
autodesk | autocad_civil_3d | * | |
autodesk | autocad_civil_3d | * | |
autodesk | autocad_civil_3d | * | |
autodesk | autocad_electrical | * | |
autodesk | autocad_electrical | * | |
autodesk | autocad_electrical | * | |
autodesk | autocad_electrical | * | |
autodesk | autocad_lt | * | |
autodesk | autocad_lt | * | |
autodesk | autocad_lt | * | |
autodesk | autocad_lt | * | |
autodesk | autocad_lt | * | |
autodesk | autocad_lt | * | |
autodesk | autocad_lt | * | |
autodesk | autocad_map_3d | * | |
autodesk | autocad_map_3d | * | |
autodesk | autocad_map_3d | * | |
autodesk | autocad_map_3d | * | |
autodesk | autocad_mechanical | * | |
autodesk | autocad_mechanical | * | |
autodesk | autocad_mechanical | * | |
autodesk | autocad_mechanical | * | |
autodesk | autocad_mep | * | |
autodesk | autocad_mep | * | |
autodesk | autocad_mep | * | |
autodesk | autocad_mep | * | |
autodesk | autocad_plant_3d | * | |
autodesk | autocad_plant_3d | * | |
autodesk | autocad_plant_3d | * | |
autodesk | autocad_plant_3d | * | |
autodesk | design_review | 2018 | |
autodesk | design_review | 2018 | |
autodesk | design_review | 2018 | |
autodesk | design_review | 2018 | |
autodesk | dwg_trueview | * | |
autodesk | dwg_trueview | * | |
autodesk | dwg_trueview | * | |
autodesk | dwg_trueview | * | |
autodesk | fusion | * | |
autodesk | infrastructure_parts_editor | * | |
autodesk | infrastructure_parts_editor | * | |
autodesk | infrastructure_parts_editor | 2021 | |
autodesk | infrastructure_parts_editor | 2022 | |
autodesk | infraworks | * | |
autodesk | infraworks | * | |
autodesk | infraworks | * | |
autodesk | infraworks | 2019.3 | |
autodesk | infraworks | 2019.3 | |
autodesk | infraworks | 2019.3 | |
autodesk | infraworks | 2019.3 | |
autodesk | infraworks | 2020.2 | |
autodesk | infraworks | 2020.2 | |
autodesk | infraworks | 2020.2 | |
autodesk | infraworks | 2021.2 | |
autodesk | infraworks | 2021.2 | |
autodesk | infraworks | 2021.2 | |
autodesk | infraworks | 2022.0 | |
autodesk | infraworks | 2022.0 | |
autodesk | infraworks | 2022.1 | |
autodesk | inventor | * | |
autodesk | inventor | * | |
autodesk | inventor | * | |
autodesk | inventor | * | |
autodesk | navisworks | * | |
autodesk | navisworks | * | |
autodesk | navisworks | * | |
autodesk | navisworks | * | |
autodesk | revit | * | |
autodesk | revit | * | |
autodesk | revit | * | |
autodesk | revit | 2022 | |
autodesk | storm_and_sanitary_analysis | * | |
autodesk | storm_and_sanitary_analysis | * | |
autodesk | storm_and_sanitary_analysis | 2019 | |
autodesk | storm_and_sanitary_analysis | 2022 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*", "matchCriteriaId": "B0E84020-F179-4AF3-BF9C-6D27259B2847", "versionEndExcluding": "2019.1.4", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*", "matchCriteriaId": "87941CE7-7F89-4A09-BBE8-A0D829273A63", "versionEndExcluding": "2020.1.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*", "matchCriteriaId": "6F98B75B-1471-42A7-BCDA-95F7E65B7FD1", "versionEndExcluding": "2021.1.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C5F50DF-4792-4A29-BB21-5821CA5E3A22", "versionEndExcluding": "2022.1.2", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:*:*:*:*:*:*:*:*", "matchCriteriaId": "183990CB-4AA2-4EEE-8A14-8BF3AD203347", "versionEndExcluding": "2019.1.4", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:*:*:*:*:*:*:*:*", "matchCriteriaId": "4A416E4B-0910-45FB-B468-A6D159C6FD11", "versionEndExcluding": "2020.1.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A873E71-BC29-43BC-AFB2-98C06AE29F3B", "versionEndExcluding": "2021.1.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:*:*:*:*:*:*:*:*", "matchCriteriaId": "ED3A19CA-3D6A-42D6-86C5-6B4E494064FF", "versionEndExcluding": "2022.1.2", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*", "matchCriteriaId": "C9338B09-BCD8-4E67-A331-1B8D5FB5DA24", "versionEndExcluding": "2019.1.4", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*", "matchCriteriaId": "F616B84F-B471-43B9-BC5D-BA6CCE461F56", "versionEndExcluding": "2020.1.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*", "matchCriteriaId": "AD0B37E9-4987-4B96-9B31-6168961E1496", "versionEndExcluding": "2021.1.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9466EE6-83C9-492F-8486-F3E6C1DD9F5A", "versionEndExcluding": "2022.1.2", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "20371433-EA59-442E-947A-CF0A6AFD750C", "versionEndExcluding": "2019.1.4", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "AF176D9D-1FAE-42DA-B03C-5A3E66408D52", "versionEndExcluding": "2020.1.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "FD0CB6CF-53F6-4FED-8BE5-F3E31832237F", "versionEndExcluding": "2021.1.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "145CD700-BC3E-4F2B-82ED-FA51A0296C67", "versionEndExcluding": "2022.1.2", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*", "matchCriteriaId": "86CF88E0-A49D-4528-8135-6BE5C9E5DD7C", "versionEndExcluding": "2019.1.4", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*", "matchCriteriaId": "E716111F-273B-48DF-ADEA-44BADE5E7FEB", "versionEndExcluding": "2020.1.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*", "matchCriteriaId": "71FA0271-BE55-48AD-B88D-34645684E9DE", "versionEndExcluding": "2021.1.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*", "matchCriteriaId": "6DD91E39-A3D8-4806-A778-608FD6C29BB2", "versionEndExcluding": "2022.1.2", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:*:*:*", "matchCriteriaId": "77A1562A-07B8-4130-B319-1BE2800D8771", "versionEndExcluding": "2019.1.4", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:*:*:*", "matchCriteriaId": "0E59ACB5-8745-46A8-889E-005DEA38925B", "versionEndExcluding": "2020.1.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:macos:*:*", "matchCriteriaId": "8FB94403-A063-4BDB-BE35-E198BF128709", "versionEndExcluding": "2020.3.2", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:*:*:*", "matchCriteriaId": "CFFE146F-4AB2-45B2-9F87-52DD8DC26B85", "versionEndExcluding": "2021.1.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:macos:*:*", "matchCriteriaId": "06B6CA6F-48E9-4A48-B1A2-7537DCE9939E", "versionEndExcluding": "2021.2.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:*:*:*", "matchCriteriaId": "D01E3771-86FD-483D-BCCB-1B1CDD4C482F", "versionEndExcluding": "2022.1.2", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:macos:*:*", "matchCriteriaId": "EEC464C9-D741-41B4-B460-B4305BCD83FA", "versionEndExcluding": "2022.2.2", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "230F8974-9613-4B58-8621-67CCE81E208C", "versionEndExcluding": "2019.1.4", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "D9184783-2476-4ED0-9F05-CA2AC68446B3", "versionEndExcluding": "2020.1.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "752B8F1C-54E3-4985-97A4-86FBF13E6BFD", "versionEndExcluding": "2021.1.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "120326C3-E212-4341-A25D-BC3DD50CF228", "versionEndExcluding": "2022.1.2", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*", "matchCriteriaId": "AF0FCE36-8A0F-4CDB-86B3-D8F7875511FD", "versionEndExcluding": "2019.1.4", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*", "matchCriteriaId": "5BAA6D71-2B11-4490-A1C4-652347582EF6", "versionEndExcluding": "2020.1.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*", "matchCriteriaId": "6F78C528-605C-46F3-8CF0-828B682745B3", "versionEndExcluding": "2021.1.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*", "matchCriteriaId": "B117299A-C5FE-419F-9C1C-DF58A2772055", "versionEndExcluding": "2022.1.2", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*", "matchCriteriaId": "1075AC6C-C9E1-45EA-B371-B06235C6AA86", "versionEndExcluding": "2019.1.4", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*", "matchCriteriaId": "CBC04C9D-9E69-4CB7-BF7A-D3B8C0670114", "versionEndExcluding": "2020.1.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E140DC9-7000-48ED-A5C7-B23023DFB199", "versionEndExcluding": "2021.1.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*", "matchCriteriaId": "CC178212-E440-46E9-9F00-60A5516D4D72", "versionEndExcluding": "2022.1.2", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "C71A1AD7-4651-4FA9-9114-023E07DCB285", "versionEndExcluding": "2019.1.4", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "C2A2E5FC-9717-47C1-A223-F90DC572DAB0", "versionEndExcluding": "2020.1.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "984491F0-8303-4C6C-B884-00C032D797DD", "versionEndExcluding": "2021.1.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "7ED0DB1D-6F37-4C1B-B55E-42F3A4E34299", "versionEndExcluding": "2022.1.2", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:-:*:*:*:*:*:*", "matchCriteriaId": "213232B9-A40B-436D-A66A-B65C49D59BE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix:*:*:*:*:*:*", "matchCriteriaId": "2D0CF4DC-ACA5-41D0-B28E-CEB5D2C96F71", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix2:*:*:*:*:*:*", "matchCriteriaId": "84ED1789-A17F-48F7-A152-09D2A5C59254", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix3:*:*:*:*:*:*", "matchCriteriaId": "74819924-EB63-4BBF-9986-FEF6100EEE15", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:dwg_trueview:*:*:*:*:*:*:*:*", "matchCriteriaId": "3FB6CD03-F783-49F7-A9D2-C97C642E8B29", "versionEndExcluding": "2019.1.4", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:dwg_trueview:*:*:*:*:*:*:*:*", "matchCriteriaId": "7E9DF065-576B-46B8-9F64-A16D9CB25398", "versionEndExcluding": "2020.1.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:dwg_trueview:*:*:*:*:*:*:*:*", "matchCriteriaId": "631D559D-B4CB-4D6A-93A7-94C0CA9C232B", "versionEndExcluding": "2021.1.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:dwg_trueview:*:*:*:*:*:*:*:*", "matchCriteriaId": "713BBAEC-BE6D-40BC-9FB3-EBB906FB09BA", "versionEndExcluding": "2022.1.1", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E6ACCB8-A327-484D-A542-9BC30BA4554A", "versionEndExcluding": "2.0.11405", "versionStartIncluding": "2.0.10356", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infrastructure_parts_editor:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F3054F1-0ED3-4C71-90E0-764EC5757F6B", "versionEndExcluding": "2019.2.2", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infrastructure_parts_editor:*:*:*:*:*:*:*:*", "matchCriteriaId": "27BA9C22-0044-429D-AD68-C040DF0E1E34", "versionEndExcluding": "2020.0.2", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infrastructure_parts_editor:2021:*:*:*:*:*:*:*", "matchCriteriaId": "C59A098D-F778-49BB-8B02-61DFA956D456", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infrastructure_parts_editor:2022:*:*:*:*:*:*:*", "matchCriteriaId": "829ACB24-271D-440F-8723-FDAE2430373E", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:*:*:*:*:*:*:*:*", "matchCriteriaId": "36D46284-4E2E-4C56-B830-3C786D5A238F", "versionEndExcluding": "2019.3", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:*:*:*:*:*:*:*:*", "matchCriteriaId": "180513CE-CEC1-4FF7-B1CB-03835D6B8797", "versionEndExcluding": "2020.2", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:*:*:*:*:*:*:*:*", "matchCriteriaId": "FE68AFE1-0F44-4B37-87E5-C7D658186425", "versionEndExcluding": "2021.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:2019.3:-:*:*:*:*:*:*", "matchCriteriaId": "6974FEA3-2CDE-438D-A153-372A20E0338A", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:2019.3:hotfix_1:*:*:*:*:*:*", "matchCriteriaId": "3D85361A-B19D-444A-A075-73DF234C081B", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:2019.3:hotfix_2:*:*:*:*:*:*", "matchCriteriaId": "8F7898E8-E540-4775-943C-26A4A7A7BA60", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:2019.3:hotfix_3:*:*:*:*:*:*", "matchCriteriaId": "5C6290F4-E5E6-4146-982E-9CB0FC693B5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:2020.2:-:*:*:*:*:*:*", "matchCriteriaId": "9A3FB713-593D-4CF4-97EE-10498DF3B008", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:2020.2:hotfix_1:*:*:*:*:*:*", "matchCriteriaId": "1AF37BF8-1921-4D94-89D3-7890F2DA7048", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:2020.2:hotfix_2:*:*:*:*:*:*", "matchCriteriaId": "7A1EAD58-4213-4340-9019-543A223C155D", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:2021.2:-:*:*:*:*:*:*", "matchCriteriaId": "E8799159-8E69-4463-96D9-920E64A675B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:2021.2:hotfix_1:*:*:*:*:*:*", "matchCriteriaId": "DDAE8B1C-5799-4FCB-AA1F-E01C72C545B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:2021.2:hotfix_2:*:*:*:*:*:*", "matchCriteriaId": "BAB28476-5965-441D-AAEF-F76F7C599F3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:2022.0:-:*:*:*:*:*:*", "matchCriteriaId": "23B89172-71E0-482F-ABD9-E640EE18E1B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:2022.0:hotfix_1:*:*:*:*:*:*", "matchCriteriaId": "C7E432F3-925E-4120-9568-F679302A26B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:2022.1:*:*:*:*:*:*:*", "matchCriteriaId": "CA85576C-0D0E-4724-AC3F-0FCB9B4F7D2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:inventor:*:*:*:*:*:*:*:*", "matchCriteriaId": "CE08EFFE-4D11-4CFD-A013-4ABEB5D8D36F", "versionEndExcluding": "2019.6", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:inventor:*:*:*:*:*:*:*:*", "matchCriteriaId": "72B1AA4E-8E9C-40C3-9402-92B64BE19D83", "versionEndExcluding": "2020.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:inventor:*:*:*:*:*:*:*:*", "matchCriteriaId": "400ADD0C-F69C-41DF-B682-5DE90B2BC142", "versionEndExcluding": "2021.4", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:inventor:*:*:*:*:*:*:*:*", "matchCriteriaId": "D53B7E4C-4F2E-428D-A6CB-D4F2FB5865B0", "versionEndExcluding": "2022.2", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:navisworks:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA8C5795-C1E7-4E84-BAFD-A2F16DCD0B51", "versionEndExcluding": "2019.7", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:navisworks:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC07E959-8A9E-448D-9E4F-EF7D41C4B1A7", "versionEndExcluding": "2020.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:navisworks:*:*:*:*:*:*:*:*", "matchCriteriaId": "DD6A1944-2576-406F-8010-9080C68654D5", "versionEndExcluding": "2021.4", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:navisworks:*:*:*:*:*:*:*:*", "matchCriteriaId": "7AAFCE8D-C6FA-4179-BBD8-134F91261FEC", "versionEndExcluding": "2022.2", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:*", "matchCriteriaId": "34EEF338-800E-4350-BC57-815A4AC19523", "versionEndExcluding": "2019.2.4", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:*", "matchCriteriaId": "655285C9-9DBC-4DA3-8A53-7D87A2CFFBF7", "versionEndExcluding": "2020.2.6", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:*", "matchCriteriaId": "81E7B898-A0C4-4458-8389-3310A2A889AE", "versionEndExcluding": "2021.1.5", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:revit:2022:*:*:*:*:*:*:*", "matchCriteriaId": "70FD96A0-AC16-4E51-B4C1-6BB14C2D905A", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:storm_and_sanitary_analysis:*:*:*:*:*:*:*:*", "matchCriteriaId": "A7FDF255-2066-4115-83BC-D38DD09A8E6A", "versionEndExcluding": "2020.3.1", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:storm_and_sanitary_analysis:*:*:*:*:*:*:*:*", "matchCriteriaId": "C2591CF9-EA06-4EEC-9A13-80CE6864C08A", "versionEndExcluding": "2021.3.1", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:storm_and_sanitary_analysis:2019:*:*:*:*:*:*:*", "matchCriteriaId": "9AC1FC52-ACBC-4119-B42E-0297375B4522", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:storm_and_sanitary_analysis:2022:*:*:*:*:*:*:*", "matchCriteriaId": "AEAA2573-ABD3-4379-ADBE-A0508D2D38EF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A heap-based buffer overflow could occur while parsing TIFF, PICT, TGA, or RLC files. This vulnerability may be exploited to execute arbitrary code." }, { "lang": "es", "value": "Podr\u00eda producirse un desbordamiento del b\u00fafer en la regi\u00f3n heap de la memoria pila mientras son analizados archivos TIFF, PICT, TGA o RLC. Esta vulnerabilidad puede ser explotada para ejecutar c\u00f3digo arbitrario" } ], "id": "CVE-2021-40164", "lastModified": "2024-11-21T06:23:42.310", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-10-07T18:15:14.560", "references": [ { "source": "psirt@autodesk.com", "tags": [ "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0011" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0011" } ], "sourceIdentifier": "psirt@autodesk.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-07-09 15:15
Modified
2024-11-21 05:57
Severity ?
Summary
A maliciously crafted TIFF, TIF, PICT, TGA, or DWF files in Autodesk Design Review 2018, 2017, 2013, 2012, 2011 can be forced to read beyond allocated boundaries when parsing the TIFF, PICT, TGA or DWF files. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@autodesk.com | https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004 | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
autodesk | design_review | 2011 | |
autodesk | design_review | 2012 | |
autodesk | design_review | 2013 | |
autodesk | design_review | 2017 | |
autodesk | design_review | 2018 | |
autodesk | design_review | 2018 | |
autodesk | design_review | 2018 | |
autodesk | design_review | 2018 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autodesk:design_review:2011:*:*:*:*:*:*:*", "matchCriteriaId": "83CF6CDF-806C-4DC5-B572-C1C2BC2C25F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2012:*:*:*:*:*:*:*", "matchCriteriaId": "2A78B6F8-DF84-4E6C-A247-0F6D2F8CA679", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2013:*:*:*:*:*:*:*", "matchCriteriaId": "DCD2CA9B-16E1-4BE7-A4E1-A9817A503958", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2017:*:*:*:*:*:*:*", "matchCriteriaId": "31F2529F-ECF0-4568-BBDC-82B396A52332", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:-:*:*:*:*:*:*", "matchCriteriaId": "213232B9-A40B-436D-A66A-B65C49D59BE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix:*:*:*:*:*:*", "matchCriteriaId": "2D0CF4DC-ACA5-41D0-B28E-CEB5D2C96F71", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix2:*:*:*:*:*:*", "matchCriteriaId": "84ED1789-A17F-48F7-A152-09D2A5C59254", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix3:*:*:*:*:*:*", "matchCriteriaId": "74819924-EB63-4BBF-9986-FEF6100EEE15", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A maliciously crafted TIFF, TIF, PICT, TGA, or DWF files in Autodesk Design Review 2018, 2017, 2013, 2012, 2011 can be forced to read beyond allocated boundaries when parsing the TIFF, PICT, TGA or DWF files. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process." }, { "lang": "es", "value": "Un archivo TIFF, TIF, PICT, TGA o DWF malintencionado en Autodesk Design Review 2018, 2017, 2013, 2012, 2011 puede ser forzado a leer m\u00e1s all\u00e1 de los l\u00edmites asignados al analizar los archivos TIFF, PICT, TGA o DWF. Esta vulnerabilidad en conjunto con otras vulnerabilidades podr\u00eda llevar a la ejecuci\u00f3n de c\u00f3digo en el contexto del proceso actual" } ], "id": "CVE-2021-27035", "lastModified": "2024-11-21T05:57:13.320", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-07-09T15:15:07.877", "references": [ { "source": "psirt@autodesk.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ], "sourceIdentifier": "psirt@autodesk.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-12-08 16:59
Modified
2024-11-21 02:20
Severity ?
Summary
The AdView.AdViewer.1 ActiveX control in Autodesk Design Review (ADR) before 2013 Hotfix 1 allows remote attackers to execute arbitrary code via a crafted DWF file.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://knowledge.autodesk.com/support/design-review/downloads/caas/downloads/content/autodesk-design-review-2013-hotfix.html | Patch, Vendor Advisory | |
cve@mitre.org | http://www.zerodayinitiative.com/advisories/ZDI-14-402/ | ||
af854a3a-2127-422b-91ae-364da2661108 | http://knowledge.autodesk.com/support/design-review/downloads/caas/downloads/content/autodesk-design-review-2013-hotfix.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.zerodayinitiative.com/advisories/ZDI-14-402/ |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
autodesk | design_review | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autodesk:design_review:*:*:*:*:*:*:*:*", "matchCriteriaId": "21090D32-132A-4DE8-BB82-AC42949396F3", "versionEndIncluding": "2013", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The AdView.AdViewer.1 ActiveX control in Autodesk Design Review (ADR) before 2013 Hotfix 1 allows remote attackers to execute arbitrary code via a crafted DWF file." }, { "lang": "es", "value": "El control AdView.AdViewer.1 ActiveX en Autodesk Design Review (ADR) anterior a 2013 Hotfix 1 permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de un fichero DWF manipulado." } ], "id": "CVE-2014-9268", "lastModified": "2024-11-21T02:20:30.887", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2014-12-08T16:59:09.793", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://knowledge.autodesk.com/support/design-review/downloads/caas/downloads/content/autodesk-design-review-2013-hotfix.html" }, { "source": "cve@mitre.org", "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-402/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://knowledge.autodesk.com/support/design-review/downloads/caas/downloads/content/autodesk-design-review-2013-hotfix.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.zerodayinitiative.com/advisories/ZDI-14-402/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-06-25 13:15
Modified
2024-11-21 05:57
Severity ?
Summary
A maliciously crafted DWG file can be used to write beyond the allocated buffer while parsing DWG files. This vulnerability can be exploited to execute arbitrary code
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
autodesk | advance_steel | * | |
autodesk | advance_steel | * | |
autodesk | advance_steel | * | |
autodesk | advance_steel | * | |
autodesk | autocad | * | |
autodesk | autocad | * | |
autodesk | autocad | * | |
autodesk | autocad | * | |
autodesk | autocad_architecture | * | |
autodesk | autocad_architecture | * | |
autodesk | autocad_architecture | * | |
autodesk | autocad_architecture | * | |
autodesk | autocad_electrical | * | |
autodesk | autocad_electrical | * | |
autodesk | autocad_electrical | * | |
autodesk | autocad_electrical | * | |
autodesk | autocad_lt | * | |
autodesk | autocad_lt | * | |
autodesk | autocad_lt | * | |
autodesk | autocad_lt | * | |
autodesk | autocad_map_3d | * | |
autodesk | autocad_map_3d | * | |
autodesk | autocad_map_3d | * | |
autodesk | autocad_map_3d | * | |
autodesk | autocad_mechanical | * | |
autodesk | autocad_mechanical | * | |
autodesk | autocad_mechanical | * | |
autodesk | autocad_mechanical | * | |
autodesk | autocad_mep | * | |
autodesk | autocad_mep | * | |
autodesk | autocad_mep | * | |
autodesk | autocad_mep | * | |
autodesk | autocad_plant_3d | * | |
autodesk | autocad_plant_3d | * | |
autodesk | autocad_plant_3d | * | |
autodesk | autocad_plant_3d | * | |
autodesk | civil_3d | * | |
autodesk | civil_3d | * | |
autodesk | civil_3d | * | |
autodesk | civil_3d | * | |
autodesk | design_review | 2018 | |
autodesk | design_review | 2018 | |
autodesk | design_review | 2018 | |
autodesk | design_review | 2018 | |
autodesk | design_review | 2018 | |
iconics | genesis64 | * | |
mitsubishielectric | mc_works64 | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:*", "matchCriteriaId": "DDC0E547-C366-4A0E-95DE-EC420492E698", "versionEndExcluding": "2019.1.3", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:*", "matchCriteriaId": "B8319413-E093-4931-B2DB-A46522DF93C9", "versionEndExcluding": "2020.1.4", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B350B87-23EC-44F8-9A5F-9AC815E15BD9", "versionEndExcluding": "2021.1.1", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:*", "matchCriteriaId": "CAE14E69-8BCB-4E00-8BAB-CB7F1688DC27", "versionEndExcluding": "2022.0.1", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*", "matchCriteriaId": "A084A960-35D8-4B9C-87DE-0213CA40CAD8", "versionEndExcluding": "2019.1.3", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*", "matchCriteriaId": "20EE0BDC-3A97-4CD4-A232-922F8D613856", "versionEndExcluding": "2020.1.4", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*", "matchCriteriaId": "5FDD2042-5313-4658-AA4E-109684E91C43", "versionEndExcluding": "2021.1.1", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*", "matchCriteriaId": "FE031BD1-9F02-44C2-865E-2011511B36F5", "versionEndExcluding": "2022.0.1", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*", "matchCriteriaId": "0A51CDDA-0D83-4331-9AB6-F6ED076157F6", "versionEndExcluding": "2019.1.3", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*", "matchCriteriaId": "143F8B16-E253-477E-9875-94928BE5596B", "versionEndExcluding": "2020.1.4", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*", "matchCriteriaId": "607A4804-A286-4237-82C3-8BE98662AE20", "versionEndExcluding": "2021.1.1", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*", "matchCriteriaId": "967B286E-5E73-47E3-BC2F-951E26720370", "versionEndIncluding": "2022.0.1", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*", "matchCriteriaId": "64C50E3E-8EFA-4B0D-B284-CF8FE4129866", "versionEndExcluding": "2019.1.3", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*", "matchCriteriaId": "CBD4F808-CA46-4A8E-82DD-6D1A82DDF91C", "versionEndExcluding": "2020.1.4", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*", "matchCriteriaId": "DFD09E68-2C34-4E76-9B67-868FA6E825A6", "versionEndExcluding": "2021.1.1", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*", "matchCriteriaId": "08BC587D-E4C7-4758-8AF5-1970892C35C8", "versionEndExcluding": "2022.0.1", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:*:*:*", "matchCriteriaId": "282A07AC-8D43-4580-8D2E-8E30370049F3", "versionEndExcluding": "2019.1.3", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:*:*:*", "matchCriteriaId": "E37E4967-AC88-42D6-98C2-1BA63F20BD5C", "versionEndExcluding": "2020.1.4", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:*:*:*", "matchCriteriaId": "49512EB3-DE17-45FF-AB90-2966462A9C3C", "versionEndExcluding": "2021.1.1", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:*:*:*", "matchCriteriaId": "01A870BA-E78E-4975-BF6D-7D410BE8CD6C", "versionEndExcluding": "2022.0.1", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "6EF85630-3DDC-4026-AC5A-F1B197F98C9E", "versionEndExcluding": "2019.1.3", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "F5309100-B3E9-4144-AEA3-B9030E93FD78", "versionEndExcluding": "2020.1.4", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "954682D1-2E7A-4EAB-B4B8-43E2038EB7C7", "versionEndExcluding": "2021.1.1", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "1016D7F3-2780-4412-A7AA-361B44A8632E", "versionEndExcluding": "2022.0.1", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*", "matchCriteriaId": "A3D0B0D7-FC6F-43D8-85AA-AC0BD464E5A1", "versionEndExcluding": "2019.1.3", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*", "matchCriteriaId": "AF6DF983-6772-45D4-A82A-EE1BB2EEFD4F", "versionEndExcluding": "2020.1.4", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7ABD866-E08B-42F3-A19A-5574563AA540", "versionEndExcluding": "2021.1.1", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*", "matchCriteriaId": "6716F29E-FBA2-4178-A8AE-269D9CC5AC59", "versionEndExcluding": "2022.0.1", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*", "matchCriteriaId": "372905FF-2C9B-4366-BE56-36CACDA63BCD", "versionEndExcluding": "2019.1.3", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2F1DCEB-7ABB-4109-943A-E2DEFB17D330", "versionEndExcluding": "2020.1.4", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA49E2B8-CBF5-4F6E-A832-D1FDB597FADE", "versionEndExcluding": "2021.1.1", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CF7601F-D6A3-4CD6-961D-B8B1B82E29CE", "versionEndExcluding": "2022.0.1", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "5F285B8D-585C-4C23-98FA-E09DE53C8247", "versionEndExcluding": "2019.1.3", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "A10D9CEE-D92D-470D-928F-8F90243618EE", "versionEndExcluding": "2020.1.4", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "0199953B-BCAC-405E-BDC6-951BEAE01570", "versionEndExcluding": "2021.1.1", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "FBDFDF50-5230-41F1-B380-AD3EC4B53DB7", "versionEndExcluding": "2022.0.1", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "F6A3326B-382B-4137-B0E7-0D54E825B717", "versionEndExcluding": "2019.1.3", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "48F67A57-7528-406B-9BF1-6A963F732564", "versionEndExcluding": "2020.1.4", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "825FC323-CAE7-4B39-85AD-966980D30D89", "versionEndExcluding": "2021.1.1", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "F430EA73-2B9F-42D9-9005-42F439ABF63C", "versionEndExcluding": "2022.0.1", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:-:*:*:*:*:*:*", "matchCriteriaId": "213232B9-A40B-436D-A66A-B65C49D59BE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix:*:*:*:*:*:*", "matchCriteriaId": "2D0CF4DC-ACA5-41D0-B28E-CEB5D2C96F71", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix2:*:*:*:*:*:*", "matchCriteriaId": "84ED1789-A17F-48F7-A152-09D2A5C59254", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix3:*:*:*:*:*:*", "matchCriteriaId": "74819924-EB63-4BBF-9986-FEF6100EEE15", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix4:*:*:*:*:*:*", "matchCriteriaId": "100922EF-C773-4798-B352-B16FCAD48F36", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:iconics:genesis64:*:*:*:*:*:*:*:*", "matchCriteriaId": "EC66E916-D8A4-475B-A7E3-4E2FEF46A7B9", "versionEndIncluding": "10.97", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mitsubishielectric:mc_works64:*:*:*:*:*:*:*:*", "matchCriteriaId": "AAE9E820-2348-4895-9F7D-96071747109D", "versionEndIncluding": "4.04e", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A maliciously crafted DWG file can be used to write beyond the allocated buffer while parsing DWG files. This vulnerability can be exploited to execute arbitrary code" }, { "lang": "es", "value": "Un archivo DWG malicioso puede ser utilizado para escribir m\u00e1s all\u00e1 del buffer asignado mientras se analizan los archivos DWG. Esta vulnerabilidad puede ser explotada para ejecutar c\u00f3digo arbitrario" } ], "id": "CVE-2021-27041", "lastModified": "2024-11-21T05:57:14.057", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-06-25T13:15:08.217", "references": [ { "source": "psirt@autodesk.com", "tags": [ "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0007" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0007" } ], "sourceIdentifier": "psirt@autodesk.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-10-21 16:15
Modified
2024-11-21 07:25
Severity ?
Summary
A malicious crafted dwf or .pct file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by read access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@autodesk.com | https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004 | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
autodesk | autocad | 2019 | |
autodesk | autocad | 2020 | |
autodesk | autocad | 2021 | |
autodesk | autocad | 2022 | |
autodesk | autocad | 2022 | |
autodesk | autocad | 2023 | |
autodesk | autocad_advance_steel | 2019 | |
autodesk | autocad_advance_steel | 2020 | |
autodesk | autocad_advance_steel | 2021 | |
autodesk | autocad_advance_steel | 2022 | |
autodesk | autocad_advance_steel | 2023 | |
autodesk | autocad_architecture | 2019 | |
autodesk | autocad_architecture | 2020 | |
autodesk | autocad_architecture | 2021 | |
autodesk | autocad_architecture | 2022 | |
autodesk | autocad_architecture | 2023 | |
autodesk | autocad_civil_3d | 2019 | |
autodesk | autocad_civil_3d | 2020 | |
autodesk | autocad_civil_3d | 2021 | |
autodesk | autocad_civil_3d | 2022 | |
autodesk | autocad_civil_3d | 2023 | |
autodesk | autocad_electrical | 2019 | |
autodesk | autocad_electrical | 2020 | |
autodesk | autocad_electrical | 2021 | |
autodesk | autocad_electrical | 2022 | |
autodesk | autocad_electrical | 2023 | |
autodesk | autocad_lt | 2019 | |
autodesk | autocad_lt | 2020 | |
autodesk | autocad_lt | 2021 | |
autodesk | autocad_lt | 2022 | |
autodesk | autocad_lt | 2022 | |
autodesk | autocad_lt | 2023 | |
autodesk | autocad_map_3d | 2019 | |
autodesk | autocad_map_3d | 2020 | |
autodesk | autocad_map_3d | 2021 | |
autodesk | autocad_map_3d | 2022 | |
autodesk | autocad_map_3d | 2023 | |
autodesk | autocad_mechanical | 2019 | |
autodesk | autocad_mechanical | 2020 | |
autodesk | autocad_mechanical | 2021 | |
autodesk | autocad_mechanical | 2022 | |
autodesk | autocad_mechanical | 2023 | |
autodesk | autocad_mep | 2019 | |
autodesk | autocad_mep | 2020 | |
autodesk | autocad_mep | 2021 | |
autodesk | autocad_mep | 2022 | |
autodesk | autocad_mep | 2023 | |
autodesk | autocad_plant_3d | 2019 | |
autodesk | autocad_plant_3d | 2020 | |
autodesk | autocad_plant_3d | 2021 | |
autodesk | autocad_plant_3d | 2022 | |
autodesk | autocad_plant_3d | 2023 | |
autodesk | design_review | 2018 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autodesk:autocad:2019:*:*:*:*:*:*:*", "matchCriteriaId": "411DC826-735A-4BEB-84BE-9250F97F612E", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2020:*:*:*:*:*:*:*", "matchCriteriaId": "E30E2562-D38E-4764-874E-5B2FCF5639E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2021:*:*:*:*:*:*:*", "matchCriteriaId": "88B2C295-D091-4C1D-8285-4309967707BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2022:*:*:*:*:*:*:*", "matchCriteriaId": "EACE09F2-A323-4E4B-9A35-4EBAE3864E6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2022:*:*:*:*:macos:*:*", "matchCriteriaId": "68FC54D1-B4FC-404E-9742-72F8340FE3C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2023:*:*:*:*:*:*:*", "matchCriteriaId": "2241C287-9396-4AD8-B93C-3596394AB2D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:2019:*:*:*:*:*:*:*", "matchCriteriaId": "9B1CAD53-7C63-4E5D-BD2E-364A7A87AA1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:2020:*:*:*:*:*:*:*", "matchCriteriaId": "127F5A79-8E66-4ABD-8D88-8891C6D670D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:2021:*:*:*:*:*:*:*", "matchCriteriaId": "37D8982C-E506-4988-AA97-BDF1B1C3D71A", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:2022:*:*:*:*:*:*:*", "matchCriteriaId": "002AC200-6AE2-4817-91D3-957DA3AC9787", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:2023:*:*:*:*:*:*:*", "matchCriteriaId": "E881C720-E487-463E-A364-A1F9EC3C1D24", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2019:*:*:*:*:*:*:*", "matchCriteriaId": "9275E76C-2A79-462A-A9D3-D0B6BBCDD0CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2020:*:*:*:*:*:*:*", "matchCriteriaId": "B7DFA12E-48C5-47B9-BD9F-1AFACBF4E1EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2021:*:*:*:*:*:*:*", "matchCriteriaId": "535A5D39-1C82-4301-9E5B-C9E0D75F38B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2022:*:*:*:*:*:*:*", "matchCriteriaId": "316615EC-BC9F-4B6A-8163-EBECC480EFDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2023:*:*:*:*:*:*:*", "matchCriteriaId": "546AFB2D-F78A-40C2-AC55-7D07EF0BDC7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2019:*:*:*:*:*:*:*", "matchCriteriaId": "AB3A878B-2142-404F-BCF4-BB508674C6C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2020:*:*:*:*:*:*:*", "matchCriteriaId": "64F2EC88-168D-4DD1-9ADA-3F9FA60D6E35", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2021:*:*:*:*:*:*:*", "matchCriteriaId": "5D73C803-7567-4C1D-B62A-C3C52369022D", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2022:*:*:*:*:*:*:*", "matchCriteriaId": "C5F77B03-3221-4564-B4FF-7BF7EEC1C5B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2023:*:*:*:*:*:*:*", "matchCriteriaId": "C6E001C0-0D7B-44ED-BBE8-E6635C45F988", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2019:*:*:*:*:*:*:*", "matchCriteriaId": "A10DE5AF-1718-4899-9238-CFFDC72D05B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2020:*:*:*:*:*:*:*", "matchCriteriaId": "E388264D-D2D4-4BE4-9097-8F547D73ABE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2021:*:*:*:*:*:*:*", "matchCriteriaId": "16611BAA-C200-4C8B-823F-1AB95F5E1317", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2022:*:*:*:*:*:*:*", "matchCriteriaId": "E2DC5114-48D2-4D85-8E80-B4BCB0FD78F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2023:*:*:*:*:*:*:*", "matchCriteriaId": "A2949D87-C1FA-43C3-8F1F-08ED7A64F302", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2019:*:*:*:*:*:*:*", "matchCriteriaId": "03682B7E-1CF1-4456-A51F-A6ADFC177935", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2020:*:*:*:*:*:*:*", "matchCriteriaId": "371C5F60-4959-40C7-93E1-A01510A95115", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2021:*:*:*:*:*:*:*", "matchCriteriaId": "D83FB4C7-B374-4907-8E2B-EEE61C8339E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2022:*:*:*:*:*:*:*", "matchCriteriaId": "601676EC-2EB4-45D0-B1AE-0980CBD68770", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2022:*:*:*:*:macos:*:*", "matchCriteriaId": "4A2EF334-E4E2-40DA-BD51-B74EE1E0ACCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2023:*:*:*:*:*:*:*", "matchCriteriaId": "99924DDE-3D49-4D37-A361-69B28E7B94A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2019:*:*:*:*:*:*:*", "matchCriteriaId": "04E05510-B21B-4DDD-88D7-CEB8963E1AFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2020:*:*:*:*:*:*:*", "matchCriteriaId": "D4CD010A-FDBC-40F9-95AC-0CD8388B85D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2021:*:*:*:*:*:*:*", "matchCriteriaId": "FC99E0F3-AA11-4390-A7C0-5BBFCDA94E3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2022:*:*:*:*:*:*:*", "matchCriteriaId": "33AA60CF-611C-45FC-92F8-7517D87B1645", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2023:*:*:*:*:*:*:*", "matchCriteriaId": "15A36E1F-964C-4DF2-91D1-D37ECEFC1C86", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2019:*:*:*:*:*:*:*", "matchCriteriaId": "19255CEC-6161-4D44-B87E-52E86DF4FBA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2020:*:*:*:*:*:*:*", "matchCriteriaId": "7147F378-DFB0-48A8-8B05-8777E1CC7F90", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2021:*:*:*:*:*:*:*", "matchCriteriaId": "3B5C858C-4A01-4916-BE3E-B9056D67CF5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2022:*:*:*:*:*:*:*", "matchCriteriaId": "7EB83A4A-D4C2-4509-BD49-15B9BBC7BF97", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2023:*:*:*:*:*:*:*", "matchCriteriaId": "DCF7910A-432F-419E-96E0-25D638A6F298", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2019:*:*:*:*:*:*:*", "matchCriteriaId": "3F608B1C-BA96-4EA8-A540-83870262CBC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2020:*:*:*:*:*:*:*", "matchCriteriaId": "7CFAAD19-6248-42CB-B177-EC2E5141A953", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2021:*:*:*:*:*:*:*", "matchCriteriaId": "1C52D90B-578B-4281-BF0E-B7CDA425ED05", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2022:*:*:*:*:*:*:*", "matchCriteriaId": "4C8AD4F3-AA82-49F5-A18A-85127FDB8B95", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2023:*:*:*:*:*:*:*", "matchCriteriaId": "DF8D9BA5-A043-42DB-A524-6728D3BF2B90", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2019:*:*:*:*:*:*:*", "matchCriteriaId": "4E536B0D-4C95-4589-981A-2F8A6C4B44DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2020:*:*:*:*:*:*:*", "matchCriteriaId": "3FBDD3AC-FA00-462F-AA13-5A75B5D50689", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2021:*:*:*:*:*:*:*", "matchCriteriaId": "73E2E9E8-2269-4729-8D8F-3C26974F5FD2", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2022:*:*:*:*:*:*:*", "matchCriteriaId": "452A1A75-C59A-43AB-9C43-BA49EB95C39C", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2023:*:*:*:*:*:*:*", "matchCriteriaId": "07CB7F37-E6D4-40F3-85BA-EC060E923505", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:-:*:*:*:*:*:*", "matchCriteriaId": "213232B9-A40B-436D-A66A-B65C49D59BE6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A malicious crafted dwf or .pct file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by read access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process." }, { "lang": "es", "value": "Un archivo dwf o .pct malicioso dise\u00f1ado cuando es consumido mediante la aplicaci\u00f3n DesignReview.exe podr\u00eda conllevar a una vulnerabilidad de corrupci\u00f3n de memoria por violaci\u00f3n de acceso de lectura. Esta vulnerabilidad, junto con otras, podr\u00eda conllevar a una ejecuci\u00f3n de c\u00f3digo en el contexto del proceso actual" } ], "id": "CVE-2022-42944", "lastModified": "2024-11-21T07:25:38.937", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-10-21T16:15:12.077", "references": [ { "source": "psirt@autodesk.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ], "sourceIdentifier": "psirt@autodesk.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-10-07 18:15
Modified
2024-11-21 06:23
Severity ?
Summary
A maliciously crafted TIFF, PICT, TGA, or RLC file in Autodesk Image Processing component may be used to write beyond the allocated buffer while parsing TIFF, PICT, TGA, or RLC files. This vulnerability may be exploited to execute arbitrary code.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
autodesk | autocad | * | |
autodesk | autocad | * | |
autodesk | autocad | * | |
autodesk | autocad | * | |
autodesk | autocad_advance_steel | * | |
autodesk | autocad_advance_steel | * | |
autodesk | autocad_advance_steel | * | |
autodesk | autocad_advance_steel | * | |
autodesk | autocad_architecture | * | |
autodesk | autocad_architecture | * | |
autodesk | autocad_architecture | * | |
autodesk | autocad_architecture | * | |
autodesk | autocad_civil_3d | * | |
autodesk | autocad_civil_3d | * | |
autodesk | autocad_civil_3d | * | |
autodesk | autocad_civil_3d | * | |
autodesk | autocad_electrical | * | |
autodesk | autocad_electrical | * | |
autodesk | autocad_electrical | * | |
autodesk | autocad_electrical | * | |
autodesk | autocad_lt | * | |
autodesk | autocad_lt | * | |
autodesk | autocad_lt | * | |
autodesk | autocad_lt | * | |
autodesk | autocad_lt | * | |
autodesk | autocad_lt | * | |
autodesk | autocad_lt | * | |
autodesk | autocad_map_3d | * | |
autodesk | autocad_map_3d | * | |
autodesk | autocad_map_3d | * | |
autodesk | autocad_map_3d | * | |
autodesk | autocad_mechanical | * | |
autodesk | autocad_mechanical | * | |
autodesk | autocad_mechanical | * | |
autodesk | autocad_mechanical | * | |
autodesk | autocad_mep | * | |
autodesk | autocad_mep | * | |
autodesk | autocad_mep | * | |
autodesk | autocad_mep | * | |
autodesk | autocad_plant_3d | * | |
autodesk | autocad_plant_3d | * | |
autodesk | autocad_plant_3d | * | |
autodesk | autocad_plant_3d | * | |
autodesk | design_review | 2018 | |
autodesk | design_review | 2018 | |
autodesk | design_review | 2018 | |
autodesk | design_review | 2018 | |
autodesk | dwg_trueview | * | |
autodesk | dwg_trueview | * | |
autodesk | dwg_trueview | * | |
autodesk | dwg_trueview | * | |
autodesk | fusion | * | |
autodesk | infrastructure_parts_editor | * | |
autodesk | infrastructure_parts_editor | * | |
autodesk | infrastructure_parts_editor | 2021 | |
autodesk | infrastructure_parts_editor | 2022 | |
autodesk | infraworks | * | |
autodesk | infraworks | * | |
autodesk | infraworks | * | |
autodesk | infraworks | 2019.3 | |
autodesk | infraworks | 2019.3 | |
autodesk | infraworks | 2019.3 | |
autodesk | infraworks | 2019.3 | |
autodesk | infraworks | 2020.2 | |
autodesk | infraworks | 2020.2 | |
autodesk | infraworks | 2020.2 | |
autodesk | infraworks | 2021.2 | |
autodesk | infraworks | 2021.2 | |
autodesk | infraworks | 2021.2 | |
autodesk | infraworks | 2022.0 | |
autodesk | infraworks | 2022.0 | |
autodesk | infraworks | 2022.1 | |
autodesk | inventor | * | |
autodesk | inventor | * | |
autodesk | inventor | * | |
autodesk | inventor | * | |
autodesk | navisworks | * | |
autodesk | navisworks | * | |
autodesk | navisworks | * | |
autodesk | navisworks | * | |
autodesk | revit | * | |
autodesk | revit | * | |
autodesk | revit | * | |
autodesk | revit | 2022 | |
autodesk | storm_and_sanitary_analysis | * | |
autodesk | storm_and_sanitary_analysis | * | |
autodesk | storm_and_sanitary_analysis | 2019 | |
autodesk | storm_and_sanitary_analysis | 2022 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*", "matchCriteriaId": "B0E84020-F179-4AF3-BF9C-6D27259B2847", "versionEndExcluding": "2019.1.4", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*", "matchCriteriaId": "87941CE7-7F89-4A09-BBE8-A0D829273A63", "versionEndExcluding": "2020.1.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*", "matchCriteriaId": "6F98B75B-1471-42A7-BCDA-95F7E65B7FD1", "versionEndExcluding": "2021.1.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C5F50DF-4792-4A29-BB21-5821CA5E3A22", "versionEndExcluding": "2022.1.2", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:*:*:*:*:*:*:*:*", "matchCriteriaId": "183990CB-4AA2-4EEE-8A14-8BF3AD203347", "versionEndExcluding": "2019.1.4", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:*:*:*:*:*:*:*:*", "matchCriteriaId": "4A416E4B-0910-45FB-B468-A6D159C6FD11", "versionEndExcluding": "2020.1.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A873E71-BC29-43BC-AFB2-98C06AE29F3B", "versionEndExcluding": "2021.1.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:*:*:*:*:*:*:*:*", "matchCriteriaId": "ED3A19CA-3D6A-42D6-86C5-6B4E494064FF", "versionEndExcluding": "2022.1.2", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*", "matchCriteriaId": "C9338B09-BCD8-4E67-A331-1B8D5FB5DA24", "versionEndExcluding": "2019.1.4", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*", "matchCriteriaId": "F616B84F-B471-43B9-BC5D-BA6CCE461F56", "versionEndExcluding": "2020.1.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*", "matchCriteriaId": "AD0B37E9-4987-4B96-9B31-6168961E1496", "versionEndExcluding": "2021.1.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9466EE6-83C9-492F-8486-F3E6C1DD9F5A", "versionEndExcluding": "2022.1.2", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "20371433-EA59-442E-947A-CF0A6AFD750C", "versionEndExcluding": "2019.1.4", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "AF176D9D-1FAE-42DA-B03C-5A3E66408D52", "versionEndExcluding": "2020.1.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "FD0CB6CF-53F6-4FED-8BE5-F3E31832237F", "versionEndExcluding": "2021.1.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "145CD700-BC3E-4F2B-82ED-FA51A0296C67", "versionEndExcluding": "2022.1.2", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*", "matchCriteriaId": "86CF88E0-A49D-4528-8135-6BE5C9E5DD7C", "versionEndExcluding": "2019.1.4", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*", "matchCriteriaId": "E716111F-273B-48DF-ADEA-44BADE5E7FEB", "versionEndExcluding": "2020.1.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*", "matchCriteriaId": "71FA0271-BE55-48AD-B88D-34645684E9DE", "versionEndExcluding": "2021.1.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*", "matchCriteriaId": "6DD91E39-A3D8-4806-A778-608FD6C29BB2", "versionEndExcluding": "2022.1.2", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:*:*:*", "matchCriteriaId": "77A1562A-07B8-4130-B319-1BE2800D8771", "versionEndExcluding": "2019.1.4", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:*:*:*", "matchCriteriaId": "0E59ACB5-8745-46A8-889E-005DEA38925B", "versionEndExcluding": "2020.1.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:macos:*:*", "matchCriteriaId": "8FB94403-A063-4BDB-BE35-E198BF128709", "versionEndExcluding": "2020.3.2", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:*:*:*", "matchCriteriaId": "CFFE146F-4AB2-45B2-9F87-52DD8DC26B85", "versionEndExcluding": "2021.1.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:macos:*:*", "matchCriteriaId": "06B6CA6F-48E9-4A48-B1A2-7537DCE9939E", "versionEndExcluding": "2021.2.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:*:*:*", "matchCriteriaId": "D01E3771-86FD-483D-BCCB-1B1CDD4C482F", "versionEndExcluding": "2022.1.2", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:macos:*:*", "matchCriteriaId": "EEC464C9-D741-41B4-B460-B4305BCD83FA", "versionEndExcluding": "2022.2.2", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "230F8974-9613-4B58-8621-67CCE81E208C", "versionEndExcluding": "2019.1.4", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "D9184783-2476-4ED0-9F05-CA2AC68446B3", "versionEndExcluding": "2020.1.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "752B8F1C-54E3-4985-97A4-86FBF13E6BFD", "versionEndExcluding": "2021.1.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "120326C3-E212-4341-A25D-BC3DD50CF228", "versionEndExcluding": "2022.1.2", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*", "matchCriteriaId": "AF0FCE36-8A0F-4CDB-86B3-D8F7875511FD", "versionEndExcluding": "2019.1.4", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*", "matchCriteriaId": "5BAA6D71-2B11-4490-A1C4-652347582EF6", "versionEndExcluding": "2020.1.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*", "matchCriteriaId": "6F78C528-605C-46F3-8CF0-828B682745B3", "versionEndExcluding": "2021.1.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*", "matchCriteriaId": "B117299A-C5FE-419F-9C1C-DF58A2772055", "versionEndExcluding": "2022.1.2", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*", "matchCriteriaId": "1075AC6C-C9E1-45EA-B371-B06235C6AA86", "versionEndExcluding": "2019.1.4", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*", "matchCriteriaId": "CBC04C9D-9E69-4CB7-BF7A-D3B8C0670114", "versionEndExcluding": "2020.1.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E140DC9-7000-48ED-A5C7-B23023DFB199", "versionEndExcluding": "2021.1.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*", "matchCriteriaId": "CC178212-E440-46E9-9F00-60A5516D4D72", "versionEndExcluding": "2022.1.2", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "C71A1AD7-4651-4FA9-9114-023E07DCB285", "versionEndExcluding": "2019.1.4", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "C2A2E5FC-9717-47C1-A223-F90DC572DAB0", "versionEndExcluding": "2020.1.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "984491F0-8303-4C6C-B884-00C032D797DD", "versionEndExcluding": "2021.1.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "7ED0DB1D-6F37-4C1B-B55E-42F3A4E34299", "versionEndExcluding": "2022.1.2", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:-:*:*:*:*:*:*", "matchCriteriaId": "213232B9-A40B-436D-A66A-B65C49D59BE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix:*:*:*:*:*:*", "matchCriteriaId": "2D0CF4DC-ACA5-41D0-B28E-CEB5D2C96F71", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix2:*:*:*:*:*:*", "matchCriteriaId": "84ED1789-A17F-48F7-A152-09D2A5C59254", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix3:*:*:*:*:*:*", "matchCriteriaId": "74819924-EB63-4BBF-9986-FEF6100EEE15", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:dwg_trueview:*:*:*:*:*:*:*:*", "matchCriteriaId": "3FB6CD03-F783-49F7-A9D2-C97C642E8B29", "versionEndExcluding": "2019.1.4", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:dwg_trueview:*:*:*:*:*:*:*:*", "matchCriteriaId": "7E9DF065-576B-46B8-9F64-A16D9CB25398", "versionEndExcluding": "2020.1.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:dwg_trueview:*:*:*:*:*:*:*:*", "matchCriteriaId": "631D559D-B4CB-4D6A-93A7-94C0CA9C232B", "versionEndExcluding": "2021.1.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:dwg_trueview:*:*:*:*:*:*:*:*", "matchCriteriaId": "713BBAEC-BE6D-40BC-9FB3-EBB906FB09BA", "versionEndExcluding": "2022.1.1", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E6ACCB8-A327-484D-A542-9BC30BA4554A", "versionEndExcluding": "2.0.11405", "versionStartIncluding": "2.0.10356", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infrastructure_parts_editor:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F3054F1-0ED3-4C71-90E0-764EC5757F6B", "versionEndExcluding": "2019.2.2", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infrastructure_parts_editor:*:*:*:*:*:*:*:*", "matchCriteriaId": "27BA9C22-0044-429D-AD68-C040DF0E1E34", "versionEndExcluding": "2020.0.2", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infrastructure_parts_editor:2021:*:*:*:*:*:*:*", "matchCriteriaId": "C59A098D-F778-49BB-8B02-61DFA956D456", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infrastructure_parts_editor:2022:*:*:*:*:*:*:*", "matchCriteriaId": "829ACB24-271D-440F-8723-FDAE2430373E", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:*:*:*:*:*:*:*:*", "matchCriteriaId": "36D46284-4E2E-4C56-B830-3C786D5A238F", "versionEndExcluding": "2019.3", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:*:*:*:*:*:*:*:*", "matchCriteriaId": "180513CE-CEC1-4FF7-B1CB-03835D6B8797", "versionEndExcluding": "2020.2", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:*:*:*:*:*:*:*:*", "matchCriteriaId": "FE68AFE1-0F44-4B37-87E5-C7D658186425", "versionEndExcluding": "2021.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:2019.3:-:*:*:*:*:*:*", "matchCriteriaId": "6974FEA3-2CDE-438D-A153-372A20E0338A", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:2019.3:hotfix_1:*:*:*:*:*:*", "matchCriteriaId": "3D85361A-B19D-444A-A075-73DF234C081B", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:2019.3:hotfix_2:*:*:*:*:*:*", "matchCriteriaId": "8F7898E8-E540-4775-943C-26A4A7A7BA60", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:2019.3:hotfix_3:*:*:*:*:*:*", "matchCriteriaId": "5C6290F4-E5E6-4146-982E-9CB0FC693B5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:2020.2:-:*:*:*:*:*:*", "matchCriteriaId": "9A3FB713-593D-4CF4-97EE-10498DF3B008", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:2020.2:hotfix_1:*:*:*:*:*:*", "matchCriteriaId": "1AF37BF8-1921-4D94-89D3-7890F2DA7048", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:2020.2:hotfix_2:*:*:*:*:*:*", "matchCriteriaId": "7A1EAD58-4213-4340-9019-543A223C155D", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:2021.2:-:*:*:*:*:*:*", "matchCriteriaId": "E8799159-8E69-4463-96D9-920E64A675B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:2021.2:hotfix_1:*:*:*:*:*:*", "matchCriteriaId": "DDAE8B1C-5799-4FCB-AA1F-E01C72C545B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:2021.2:hotfix_2:*:*:*:*:*:*", "matchCriteriaId": "BAB28476-5965-441D-AAEF-F76F7C599F3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:2022.0:-:*:*:*:*:*:*", "matchCriteriaId": "23B89172-71E0-482F-ABD9-E640EE18E1B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:2022.0:hotfix_1:*:*:*:*:*:*", "matchCriteriaId": "C7E432F3-925E-4120-9568-F679302A26B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:2022.1:*:*:*:*:*:*:*", "matchCriteriaId": "CA85576C-0D0E-4724-AC3F-0FCB9B4F7D2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:inventor:*:*:*:*:*:*:*:*", "matchCriteriaId": "CE08EFFE-4D11-4CFD-A013-4ABEB5D8D36F", "versionEndExcluding": "2019.6", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:inventor:*:*:*:*:*:*:*:*", "matchCriteriaId": "72B1AA4E-8E9C-40C3-9402-92B64BE19D83", "versionEndExcluding": "2020.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:inventor:*:*:*:*:*:*:*:*", "matchCriteriaId": "400ADD0C-F69C-41DF-B682-5DE90B2BC142", "versionEndExcluding": "2021.4", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:inventor:*:*:*:*:*:*:*:*", "matchCriteriaId": "D53B7E4C-4F2E-428D-A6CB-D4F2FB5865B0", "versionEndExcluding": "2022.2", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:navisworks:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA8C5795-C1E7-4E84-BAFD-A2F16DCD0B51", "versionEndExcluding": "2019.7", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:navisworks:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC07E959-8A9E-448D-9E4F-EF7D41C4B1A7", "versionEndExcluding": "2020.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:navisworks:*:*:*:*:*:*:*:*", "matchCriteriaId": "DD6A1944-2576-406F-8010-9080C68654D5", "versionEndExcluding": "2021.4", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:navisworks:*:*:*:*:*:*:*:*", "matchCriteriaId": "7AAFCE8D-C6FA-4179-BBD8-134F91261FEC", "versionEndExcluding": "2022.2", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:*", "matchCriteriaId": "34EEF338-800E-4350-BC57-815A4AC19523", "versionEndExcluding": "2019.2.4", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:*", "matchCriteriaId": "655285C9-9DBC-4DA3-8A53-7D87A2CFFBF7", "versionEndExcluding": "2020.2.6", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:*", "matchCriteriaId": "81E7B898-A0C4-4458-8389-3310A2A889AE", "versionEndExcluding": "2021.1.5", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:revit:2022:*:*:*:*:*:*:*", "matchCriteriaId": "70FD96A0-AC16-4E51-B4C1-6BB14C2D905A", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:storm_and_sanitary_analysis:*:*:*:*:*:*:*:*", "matchCriteriaId": "A7FDF255-2066-4115-83BC-D38DD09A8E6A", "versionEndExcluding": "2020.3.1", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:storm_and_sanitary_analysis:*:*:*:*:*:*:*:*", "matchCriteriaId": "C2591CF9-EA06-4EEC-9A13-80CE6864C08A", "versionEndExcluding": "2021.3.1", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:storm_and_sanitary_analysis:2019:*:*:*:*:*:*:*", "matchCriteriaId": "9AC1FC52-ACBC-4119-B42E-0297375B4522", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:storm_and_sanitary_analysis:2022:*:*:*:*:*:*:*", "matchCriteriaId": "AEAA2573-ABD3-4379-ADBE-A0508D2D38EF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A maliciously crafted TIFF, PICT, TGA, or RLC file in Autodesk Image Processing component may be used to write beyond the allocated buffer while parsing TIFF, PICT, TGA, or RLC files. This vulnerability may be exploited to execute arbitrary code." }, { "lang": "es", "value": "Un archivo TIFF, PICT, TGA o RLC dise\u00f1ado de forma maliciosa en el componente de procesamiento de im\u00e1genes de Autodesk puede usarse para escribir m\u00e1s all\u00e1 del b\u00fafer asignado mientras se analizan los archivos TIFF, PICT, TGA o RLC. Esta vulnerabilidad puede ser explotada para ejecutar c\u00f3digo arbitrario" } ], "id": "CVE-2021-40165", "lastModified": "2024-11-21T06:23:42.460", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-10-07T18:15:14.650", "references": [ { "source": "psirt@autodesk.com", "tags": [ "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0011" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0011" } ], "sourceIdentifier": "psirt@autodesk.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-01-25 20:15
Modified
2024-11-21 06:23
Severity ?
Summary
A malicious crafted dwf or .pct file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by read access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
autodesk | design_review | 2018 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autodesk:design_review:2018:*:*:*:*:*:*:*", "matchCriteriaId": "7D07C55F-1D23-4E2B-AC1E-67D735F800B7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A malicious crafted dwf or .pct file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by read access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process." }, { "lang": "es", "value": "Un archivo dwf o .pct malicioso, cuando se consume a trav\u00e9s de la aplicaci\u00f3n DesignReview.exe, podr\u00eda conducir a una vulnerabilidad de corrupci\u00f3n de memoria por violaci\u00f3n de acceso de lectura. Esta vulnerabilidad, junto con otras, podr\u00eda conducir a la ejecuci\u00f3n de c\u00f3digo en el contexto del proceso actual" } ], "id": "CVE-2021-40167", "lastModified": "2024-11-21T06:23:42.830", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-01-25T20:15:08.367", "references": [ { "source": "psirt@autodesk.com", "tags": [ "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ], "sourceIdentifier": "psirt@autodesk.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-10-21 16:15
Modified
2024-11-21 07:25
Severity ?
Summary
A malicious crafted TGA file when consumed through DesignReview.exe application could lead to memory corruption vulnerability. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@autodesk.com | https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004 | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
autodesk | autocad | 2019 | |
autodesk | autocad | 2020 | |
autodesk | autocad | 2021 | |
autodesk | autocad | 2022 | |
autodesk | autocad | 2022 | |
autodesk | autocad | 2023 | |
autodesk | autocad_advance_steel | 2019 | |
autodesk | autocad_advance_steel | 2020 | |
autodesk | autocad_advance_steel | 2021 | |
autodesk | autocad_advance_steel | 2022 | |
autodesk | autocad_advance_steel | 2023 | |
autodesk | autocad_architecture | 2019 | |
autodesk | autocad_architecture | 2020 | |
autodesk | autocad_architecture | 2021 | |
autodesk | autocad_architecture | 2022 | |
autodesk | autocad_architecture | 2023 | |
autodesk | autocad_civil_3d | 2019 | |
autodesk | autocad_civil_3d | 2020 | |
autodesk | autocad_civil_3d | 2021 | |
autodesk | autocad_civil_3d | 2022 | |
autodesk | autocad_civil_3d | 2023 | |
autodesk | autocad_electrical | 2019 | |
autodesk | autocad_electrical | 2020 | |
autodesk | autocad_electrical | 2021 | |
autodesk | autocad_electrical | 2022 | |
autodesk | autocad_electrical | 2023 | |
autodesk | autocad_lt | 2019 | |
autodesk | autocad_lt | 2020 | |
autodesk | autocad_lt | 2021 | |
autodesk | autocad_lt | 2022 | |
autodesk | autocad_lt | 2022 | |
autodesk | autocad_lt | 2023 | |
autodesk | autocad_map_3d | 2019 | |
autodesk | autocad_map_3d | 2020 | |
autodesk | autocad_map_3d | 2021 | |
autodesk | autocad_map_3d | 2022 | |
autodesk | autocad_map_3d | 2023 | |
autodesk | autocad_mechanical | 2019 | |
autodesk | autocad_mechanical | 2020 | |
autodesk | autocad_mechanical | 2021 | |
autodesk | autocad_mechanical | 2022 | |
autodesk | autocad_mechanical | 2023 | |
autodesk | autocad_mep | 2019 | |
autodesk | autocad_mep | 2020 | |
autodesk | autocad_mep | 2021 | |
autodesk | autocad_mep | 2022 | |
autodesk | autocad_mep | 2023 | |
autodesk | autocad_plant_3d | 2019 | |
autodesk | autocad_plant_3d | 2020 | |
autodesk | autocad_plant_3d | 2021 | |
autodesk | autocad_plant_3d | 2022 | |
autodesk | autocad_plant_3d | 2023 | |
autodesk | design_review | 2018 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autodesk:autocad:2019:*:*:*:*:*:*:*", "matchCriteriaId": "411DC826-735A-4BEB-84BE-9250F97F612E", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2020:*:*:*:*:*:*:*", "matchCriteriaId": "E30E2562-D38E-4764-874E-5B2FCF5639E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2021:*:*:*:*:*:*:*", "matchCriteriaId": "88B2C295-D091-4C1D-8285-4309967707BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2022:*:*:*:*:*:*:*", "matchCriteriaId": "EACE09F2-A323-4E4B-9A35-4EBAE3864E6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2022:*:*:*:*:macos:*:*", "matchCriteriaId": "68FC54D1-B4FC-404E-9742-72F8340FE3C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2023:*:*:*:*:*:*:*", "matchCriteriaId": "2241C287-9396-4AD8-B93C-3596394AB2D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:2019:*:*:*:*:*:*:*", "matchCriteriaId": "9B1CAD53-7C63-4E5D-BD2E-364A7A87AA1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:2020:*:*:*:*:*:*:*", "matchCriteriaId": "127F5A79-8E66-4ABD-8D88-8891C6D670D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:2021:*:*:*:*:*:*:*", "matchCriteriaId": "37D8982C-E506-4988-AA97-BDF1B1C3D71A", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:2022:*:*:*:*:*:*:*", "matchCriteriaId": "002AC200-6AE2-4817-91D3-957DA3AC9787", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:2023:*:*:*:*:*:*:*", "matchCriteriaId": "E881C720-E487-463E-A364-A1F9EC3C1D24", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2019:*:*:*:*:*:*:*", "matchCriteriaId": "9275E76C-2A79-462A-A9D3-D0B6BBCDD0CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2020:*:*:*:*:*:*:*", "matchCriteriaId": "B7DFA12E-48C5-47B9-BD9F-1AFACBF4E1EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2021:*:*:*:*:*:*:*", "matchCriteriaId": "535A5D39-1C82-4301-9E5B-C9E0D75F38B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2022:*:*:*:*:*:*:*", "matchCriteriaId": "316615EC-BC9F-4B6A-8163-EBECC480EFDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2023:*:*:*:*:*:*:*", "matchCriteriaId": "546AFB2D-F78A-40C2-AC55-7D07EF0BDC7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2019:*:*:*:*:*:*:*", "matchCriteriaId": "AB3A878B-2142-404F-BCF4-BB508674C6C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2020:*:*:*:*:*:*:*", "matchCriteriaId": "64F2EC88-168D-4DD1-9ADA-3F9FA60D6E35", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2021:*:*:*:*:*:*:*", "matchCriteriaId": "5D73C803-7567-4C1D-B62A-C3C52369022D", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2022:*:*:*:*:*:*:*", "matchCriteriaId": "C5F77B03-3221-4564-B4FF-7BF7EEC1C5B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2023:*:*:*:*:*:*:*", "matchCriteriaId": "C6E001C0-0D7B-44ED-BBE8-E6635C45F988", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2019:*:*:*:*:*:*:*", "matchCriteriaId": "A10DE5AF-1718-4899-9238-CFFDC72D05B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2020:*:*:*:*:*:*:*", "matchCriteriaId": "E388264D-D2D4-4BE4-9097-8F547D73ABE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2021:*:*:*:*:*:*:*", "matchCriteriaId": "16611BAA-C200-4C8B-823F-1AB95F5E1317", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2022:*:*:*:*:*:*:*", "matchCriteriaId": "E2DC5114-48D2-4D85-8E80-B4BCB0FD78F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2023:*:*:*:*:*:*:*", "matchCriteriaId": "A2949D87-C1FA-43C3-8F1F-08ED7A64F302", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2019:*:*:*:*:*:*:*", "matchCriteriaId": "03682B7E-1CF1-4456-A51F-A6ADFC177935", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2020:*:*:*:*:*:*:*", "matchCriteriaId": "371C5F60-4959-40C7-93E1-A01510A95115", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2021:*:*:*:*:*:*:*", "matchCriteriaId": "D83FB4C7-B374-4907-8E2B-EEE61C8339E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2022:*:*:*:*:*:*:*", "matchCriteriaId": "601676EC-2EB4-45D0-B1AE-0980CBD68770", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2022:*:*:*:*:macos:*:*", "matchCriteriaId": "4A2EF334-E4E2-40DA-BD51-B74EE1E0ACCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2023:*:*:*:*:*:*:*", "matchCriteriaId": "99924DDE-3D49-4D37-A361-69B28E7B94A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2019:*:*:*:*:*:*:*", "matchCriteriaId": "04E05510-B21B-4DDD-88D7-CEB8963E1AFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2020:*:*:*:*:*:*:*", "matchCriteriaId": "D4CD010A-FDBC-40F9-95AC-0CD8388B85D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2021:*:*:*:*:*:*:*", "matchCriteriaId": "FC99E0F3-AA11-4390-A7C0-5BBFCDA94E3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2022:*:*:*:*:*:*:*", "matchCriteriaId": "33AA60CF-611C-45FC-92F8-7517D87B1645", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2023:*:*:*:*:*:*:*", "matchCriteriaId": "15A36E1F-964C-4DF2-91D1-D37ECEFC1C86", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2019:*:*:*:*:*:*:*", "matchCriteriaId": "19255CEC-6161-4D44-B87E-52E86DF4FBA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2020:*:*:*:*:*:*:*", "matchCriteriaId": "7147F378-DFB0-48A8-8B05-8777E1CC7F90", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2021:*:*:*:*:*:*:*", "matchCriteriaId": "3B5C858C-4A01-4916-BE3E-B9056D67CF5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2022:*:*:*:*:*:*:*", "matchCriteriaId": "7EB83A4A-D4C2-4509-BD49-15B9BBC7BF97", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2023:*:*:*:*:*:*:*", "matchCriteriaId": "DCF7910A-432F-419E-96E0-25D638A6F298", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2019:*:*:*:*:*:*:*", "matchCriteriaId": "3F608B1C-BA96-4EA8-A540-83870262CBC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2020:*:*:*:*:*:*:*", "matchCriteriaId": "7CFAAD19-6248-42CB-B177-EC2E5141A953", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2021:*:*:*:*:*:*:*", "matchCriteriaId": "1C52D90B-578B-4281-BF0E-B7CDA425ED05", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2022:*:*:*:*:*:*:*", "matchCriteriaId": "4C8AD4F3-AA82-49F5-A18A-85127FDB8B95", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2023:*:*:*:*:*:*:*", "matchCriteriaId": "DF8D9BA5-A043-42DB-A524-6728D3BF2B90", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2019:*:*:*:*:*:*:*", "matchCriteriaId": "4E536B0D-4C95-4589-981A-2F8A6C4B44DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2020:*:*:*:*:*:*:*", "matchCriteriaId": "3FBDD3AC-FA00-462F-AA13-5A75B5D50689", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2021:*:*:*:*:*:*:*", "matchCriteriaId": "73E2E9E8-2269-4729-8D8F-3C26974F5FD2", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2022:*:*:*:*:*:*:*", "matchCriteriaId": "452A1A75-C59A-43AB-9C43-BA49EB95C39C", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2023:*:*:*:*:*:*:*", "matchCriteriaId": "07CB7F37-E6D4-40F3-85BA-EC060E923505", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:-:*:*:*:*:*:*", "matchCriteriaId": "213232B9-A40B-436D-A66A-B65C49D59BE6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A malicious crafted TGA file when consumed through DesignReview.exe application could lead to memory corruption vulnerability. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process." }, { "lang": "es", "value": "Un archivo TGA dise\u00f1ado de forma maliciosa cuando es consumido mediante la aplicaci\u00f3n DesignReview.exe podr\u00eda conllevar a una vulnerabilidad de corrupci\u00f3n de memoria. Esta vulnerabilidad, junto con otras, podr\u00eda conllevar a una ejecuci\u00f3n de c\u00f3digo en el contexto del proceso actual" } ], "id": "CVE-2022-42940", "lastModified": "2024-11-21T07:25:38.373", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-10-21T16:15:11.907", "references": [ { "source": "psirt@autodesk.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ], "sourceIdentifier": "psirt@autodesk.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-12-15 21:59
Modified
2024-11-21 02:38
Severity ?
Summary
Integer overflow in Autodesk Design Review (ADR) before 2013 Hotfix 2 allows remote attackers to execute arbitrary code via a crafted biClrUsed value in a BMP file, which triggers a buffer overflow.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.securityfocus.com/bid/79800 | ||
cve@mitre.org | http://www.zerodayinitiative.com/advisories/ZDI-15-617 | ||
cve@mitre.org | https://knowledge.autodesk.com/support/design-review/downloads/caas/downloads/content/autodesk-design-review-2013-hotfix.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/79800 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.zerodayinitiative.com/advisories/ZDI-15-617 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://knowledge.autodesk.com/support/design-review/downloads/caas/downloads/content/autodesk-design-review-2013-hotfix.html | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
autodesk | design_review | 2013 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autodesk:design_review:2013:*:*:*:*:*:*:*", "matchCriteriaId": "DCD2CA9B-16E1-4BE7-A4E1-A9817A503958", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Integer overflow in Autodesk Design Review (ADR) before 2013 Hotfix 2 allows remote attackers to execute arbitrary code via a crafted biClrUsed value in a BMP file, which triggers a buffer overflow." }, { "lang": "es", "value": "Desbordamiento de entero en Autodesk Design Review (ADR) en versiones anteriores a 2013 Hotfix 2 permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de un valor biClrUsed manipulado en un archivo BMP, lo que desencadena un desbordamiento de buffer." } ], "id": "CVE-2015-8571", "lastModified": "2024-11-21T02:38:45.723", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2015-12-15T21:59:12.657", "references": [ { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/79800" }, { "source": "cve@mitre.org", "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-617" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://knowledge.autodesk.com/support/design-review/downloads/caas/downloads/content/autodesk-design-review-2013-hotfix.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/79800" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-617" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://knowledge.autodesk.com/support/design-review/downloads/caas/downloads/content/autodesk-design-review-2013-hotfix.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-189" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-10-21 16:15
Modified
2024-11-21 07:23
Severity ?
Summary
A malicious crafted .dwf or .pct file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@autodesk.com | https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004 | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
autodesk | autocad | 2019 | |
autodesk | autocad | 2020 | |
autodesk | autocad | 2021 | |
autodesk | autocad | 2022 | |
autodesk | autocad | 2022 | |
autodesk | autocad | 2023 | |
autodesk | autocad_advance_steel | 2019 | |
autodesk | autocad_advance_steel | 2020 | |
autodesk | autocad_advance_steel | 2021 | |
autodesk | autocad_advance_steel | 2022 | |
autodesk | autocad_advance_steel | 2023 | |
autodesk | autocad_architecture | 2019 | |
autodesk | autocad_architecture | 2020 | |
autodesk | autocad_architecture | 2021 | |
autodesk | autocad_architecture | 2022 | |
autodesk | autocad_architecture | 2023 | |
autodesk | autocad_civil_3d | 2019 | |
autodesk | autocad_civil_3d | 2020 | |
autodesk | autocad_civil_3d | 2021 | |
autodesk | autocad_civil_3d | 2022 | |
autodesk | autocad_civil_3d | 2023 | |
autodesk | autocad_electrical | 2019 | |
autodesk | autocad_electrical | 2020 | |
autodesk | autocad_electrical | 2021 | |
autodesk | autocad_electrical | 2022 | |
autodesk | autocad_electrical | 2023 | |
autodesk | autocad_lt | 2019 | |
autodesk | autocad_lt | 2020 | |
autodesk | autocad_lt | 2021 | |
autodesk | autocad_lt | 2022 | |
autodesk | autocad_lt | 2022 | |
autodesk | autocad_lt | 2023 | |
autodesk | autocad_map_3d | 2019 | |
autodesk | autocad_map_3d | 2020 | |
autodesk | autocad_map_3d | 2021 | |
autodesk | autocad_map_3d | 2022 | |
autodesk | autocad_map_3d | 2023 | |
autodesk | autocad_mechanical | 2019 | |
autodesk | autocad_mechanical | 2020 | |
autodesk | autocad_mechanical | 2021 | |
autodesk | autocad_mechanical | 2022 | |
autodesk | autocad_mechanical | 2023 | |
autodesk | autocad_mep | 2019 | |
autodesk | autocad_mep | 2020 | |
autodesk | autocad_mep | 2021 | |
autodesk | autocad_mep | 2022 | |
autodesk | autocad_mep | 2023 | |
autodesk | autocad_plant_3d | 2019 | |
autodesk | autocad_plant_3d | 2020 | |
autodesk | autocad_plant_3d | 2021 | |
autodesk | autocad_plant_3d | 2022 | |
autodesk | autocad_plant_3d | 2023 | |
autodesk | design_review | 2018 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autodesk:autocad:2019:*:*:*:*:*:*:*", "matchCriteriaId": "411DC826-735A-4BEB-84BE-9250F97F612E", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2020:*:*:*:*:*:*:*", "matchCriteriaId": "E30E2562-D38E-4764-874E-5B2FCF5639E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2021:*:*:*:*:*:*:*", "matchCriteriaId": "88B2C295-D091-4C1D-8285-4309967707BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2022:*:*:*:*:*:*:*", "matchCriteriaId": "EACE09F2-A323-4E4B-9A35-4EBAE3864E6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2022:*:*:*:*:macos:*:*", "matchCriteriaId": "68FC54D1-B4FC-404E-9742-72F8340FE3C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2023:*:*:*:*:*:*:*", "matchCriteriaId": "2241C287-9396-4AD8-B93C-3596394AB2D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:2019:*:*:*:*:*:*:*", "matchCriteriaId": "9B1CAD53-7C63-4E5D-BD2E-364A7A87AA1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:2020:*:*:*:*:*:*:*", "matchCriteriaId": "127F5A79-8E66-4ABD-8D88-8891C6D670D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:2021:*:*:*:*:*:*:*", "matchCriteriaId": "37D8982C-E506-4988-AA97-BDF1B1C3D71A", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:2022:*:*:*:*:*:*:*", "matchCriteriaId": "002AC200-6AE2-4817-91D3-957DA3AC9787", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:2023:*:*:*:*:*:*:*", "matchCriteriaId": "E881C720-E487-463E-A364-A1F9EC3C1D24", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2019:*:*:*:*:*:*:*", "matchCriteriaId": "9275E76C-2A79-462A-A9D3-D0B6BBCDD0CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2020:*:*:*:*:*:*:*", "matchCriteriaId": "B7DFA12E-48C5-47B9-BD9F-1AFACBF4E1EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2021:*:*:*:*:*:*:*", "matchCriteriaId": "535A5D39-1C82-4301-9E5B-C9E0D75F38B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2022:*:*:*:*:*:*:*", "matchCriteriaId": "316615EC-BC9F-4B6A-8163-EBECC480EFDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2023:*:*:*:*:*:*:*", "matchCriteriaId": "546AFB2D-F78A-40C2-AC55-7D07EF0BDC7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2019:*:*:*:*:*:*:*", "matchCriteriaId": "AB3A878B-2142-404F-BCF4-BB508674C6C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2020:*:*:*:*:*:*:*", "matchCriteriaId": "64F2EC88-168D-4DD1-9ADA-3F9FA60D6E35", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2021:*:*:*:*:*:*:*", "matchCriteriaId": "5D73C803-7567-4C1D-B62A-C3C52369022D", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2022:*:*:*:*:*:*:*", "matchCriteriaId": "C5F77B03-3221-4564-B4FF-7BF7EEC1C5B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2023:*:*:*:*:*:*:*", "matchCriteriaId": "C6E001C0-0D7B-44ED-BBE8-E6635C45F988", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2019:*:*:*:*:*:*:*", "matchCriteriaId": "A10DE5AF-1718-4899-9238-CFFDC72D05B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2020:*:*:*:*:*:*:*", "matchCriteriaId": "E388264D-D2D4-4BE4-9097-8F547D73ABE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2021:*:*:*:*:*:*:*", "matchCriteriaId": "16611BAA-C200-4C8B-823F-1AB95F5E1317", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2022:*:*:*:*:*:*:*", "matchCriteriaId": "E2DC5114-48D2-4D85-8E80-B4BCB0FD78F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2023:*:*:*:*:*:*:*", "matchCriteriaId": "A2949D87-C1FA-43C3-8F1F-08ED7A64F302", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2019:*:*:*:*:*:*:*", "matchCriteriaId": "03682B7E-1CF1-4456-A51F-A6ADFC177935", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2020:*:*:*:*:*:*:*", "matchCriteriaId": "371C5F60-4959-40C7-93E1-A01510A95115", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2021:*:*:*:*:*:*:*", "matchCriteriaId": "D83FB4C7-B374-4907-8E2B-EEE61C8339E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2022:*:*:*:*:*:*:*", "matchCriteriaId": "601676EC-2EB4-45D0-B1AE-0980CBD68770", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2022:*:*:*:*:macos:*:*", "matchCriteriaId": "4A2EF334-E4E2-40DA-BD51-B74EE1E0ACCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2023:*:*:*:*:*:*:*", "matchCriteriaId": "99924DDE-3D49-4D37-A361-69B28E7B94A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2019:*:*:*:*:*:*:*", "matchCriteriaId": "04E05510-B21B-4DDD-88D7-CEB8963E1AFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2020:*:*:*:*:*:*:*", "matchCriteriaId": "D4CD010A-FDBC-40F9-95AC-0CD8388B85D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2021:*:*:*:*:*:*:*", "matchCriteriaId": "FC99E0F3-AA11-4390-A7C0-5BBFCDA94E3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2022:*:*:*:*:*:*:*", "matchCriteriaId": "33AA60CF-611C-45FC-92F8-7517D87B1645", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2023:*:*:*:*:*:*:*", "matchCriteriaId": "15A36E1F-964C-4DF2-91D1-D37ECEFC1C86", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2019:*:*:*:*:*:*:*", "matchCriteriaId": "19255CEC-6161-4D44-B87E-52E86DF4FBA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2020:*:*:*:*:*:*:*", "matchCriteriaId": "7147F378-DFB0-48A8-8B05-8777E1CC7F90", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2021:*:*:*:*:*:*:*", "matchCriteriaId": "3B5C858C-4A01-4916-BE3E-B9056D67CF5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2022:*:*:*:*:*:*:*", "matchCriteriaId": "7EB83A4A-D4C2-4509-BD49-15B9BBC7BF97", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2023:*:*:*:*:*:*:*", "matchCriteriaId": "DCF7910A-432F-419E-96E0-25D638A6F298", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2019:*:*:*:*:*:*:*", "matchCriteriaId": "3F608B1C-BA96-4EA8-A540-83870262CBC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2020:*:*:*:*:*:*:*", "matchCriteriaId": "7CFAAD19-6248-42CB-B177-EC2E5141A953", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2021:*:*:*:*:*:*:*", "matchCriteriaId": "1C52D90B-578B-4281-BF0E-B7CDA425ED05", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2022:*:*:*:*:*:*:*", "matchCriteriaId": "4C8AD4F3-AA82-49F5-A18A-85127FDB8B95", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2023:*:*:*:*:*:*:*", "matchCriteriaId": "DF8D9BA5-A043-42DB-A524-6728D3BF2B90", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2019:*:*:*:*:*:*:*", "matchCriteriaId": "4E536B0D-4C95-4589-981A-2F8A6C4B44DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2020:*:*:*:*:*:*:*", "matchCriteriaId": "3FBDD3AC-FA00-462F-AA13-5A75B5D50689", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2021:*:*:*:*:*:*:*", "matchCriteriaId": "73E2E9E8-2269-4729-8D8F-3C26974F5FD2", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2022:*:*:*:*:*:*:*", "matchCriteriaId": "452A1A75-C59A-43AB-9C43-BA49EB95C39C", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2023:*:*:*:*:*:*:*", "matchCriteriaId": "07CB7F37-E6D4-40F3-85BA-EC060E923505", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:-:*:*:*:*:*:*", "matchCriteriaId": "213232B9-A40B-436D-A66A-B65C49D59BE6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A malicious crafted .dwf or .pct file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process." }, { "lang": "es", "value": "Un archivo .dwf o .pct dise\u00f1ado de forma maliciosa cuando es consumido mediante la aplicaci\u00f3n DesignReview.exe podr\u00eda conllevar a una vulnerabilidad de corrupci\u00f3n de memoria por violaci\u00f3n de acceso de escritura. Esta vulnerabilidad, junto con otras, podr\u00eda conllevar a una ejecuci\u00f3n de c\u00f3digo en el contexto del proceso actual" } ], "id": "CVE-2022-41309", "lastModified": "2024-11-21T07:23:01.003", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-10-21T16:15:11.457", "references": [ { "source": "psirt@autodesk.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ], "sourceIdentifier": "psirt@autodesk.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-10-21 16:15
Modified
2024-11-21 07:25
Severity ?
Summary
A malicious crafted .dwf or .pct file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@autodesk.com | https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004 | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
autodesk | autocad | 2019 | |
autodesk | autocad | 2020 | |
autodesk | autocad | 2021 | |
autodesk | autocad | 2022 | |
autodesk | autocad | 2022 | |
autodesk | autocad | 2023 | |
autodesk | autocad_advance_steel | 2019 | |
autodesk | autocad_advance_steel | 2020 | |
autodesk | autocad_advance_steel | 2021 | |
autodesk | autocad_advance_steel | 2022 | |
autodesk | autocad_advance_steel | 2023 | |
autodesk | autocad_architecture | 2019 | |
autodesk | autocad_architecture | 2020 | |
autodesk | autocad_architecture | 2021 | |
autodesk | autocad_architecture | 2022 | |
autodesk | autocad_architecture | 2023 | |
autodesk | autocad_civil_3d | 2019 | |
autodesk | autocad_civil_3d | 2020 | |
autodesk | autocad_civil_3d | 2021 | |
autodesk | autocad_civil_3d | 2022 | |
autodesk | autocad_civil_3d | 2023 | |
autodesk | autocad_electrical | 2019 | |
autodesk | autocad_electrical | 2020 | |
autodesk | autocad_electrical | 2021 | |
autodesk | autocad_electrical | 2022 | |
autodesk | autocad_electrical | 2023 | |
autodesk | autocad_lt | 2019 | |
autodesk | autocad_lt | 2020 | |
autodesk | autocad_lt | 2021 | |
autodesk | autocad_lt | 2022 | |
autodesk | autocad_lt | 2022 | |
autodesk | autocad_lt | 2023 | |
autodesk | autocad_map_3d | 2019 | |
autodesk | autocad_map_3d | 2020 | |
autodesk | autocad_map_3d | 2021 | |
autodesk | autocad_map_3d | 2022 | |
autodesk | autocad_map_3d | 2023 | |
autodesk | autocad_mechanical | 2019 | |
autodesk | autocad_mechanical | 2020 | |
autodesk | autocad_mechanical | 2021 | |
autodesk | autocad_mechanical | 2022 | |
autodesk | autocad_mechanical | 2023 | |
autodesk | autocad_mep | 2019 | |
autodesk | autocad_mep | 2020 | |
autodesk | autocad_mep | 2021 | |
autodesk | autocad_mep | 2022 | |
autodesk | autocad_mep | 2023 | |
autodesk | autocad_plant_3d | 2019 | |
autodesk | autocad_plant_3d | 2020 | |
autodesk | autocad_plant_3d | 2021 | |
autodesk | autocad_plant_3d | 2022 | |
autodesk | autocad_plant_3d | 2023 | |
autodesk | design_review | 2018 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autodesk:autocad:2019:*:*:*:*:*:*:*", "matchCriteriaId": "411DC826-735A-4BEB-84BE-9250F97F612E", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2020:*:*:*:*:*:*:*", "matchCriteriaId": "E30E2562-D38E-4764-874E-5B2FCF5639E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2021:*:*:*:*:*:*:*", "matchCriteriaId": "88B2C295-D091-4C1D-8285-4309967707BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2022:*:*:*:*:*:*:*", "matchCriteriaId": "EACE09F2-A323-4E4B-9A35-4EBAE3864E6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2022:*:*:*:*:macos:*:*", "matchCriteriaId": "68FC54D1-B4FC-404E-9742-72F8340FE3C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2023:*:*:*:*:*:*:*", "matchCriteriaId": "2241C287-9396-4AD8-B93C-3596394AB2D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:2019:*:*:*:*:*:*:*", "matchCriteriaId": "9B1CAD53-7C63-4E5D-BD2E-364A7A87AA1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:2020:*:*:*:*:*:*:*", "matchCriteriaId": "127F5A79-8E66-4ABD-8D88-8891C6D670D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:2021:*:*:*:*:*:*:*", "matchCriteriaId": "37D8982C-E506-4988-AA97-BDF1B1C3D71A", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:2022:*:*:*:*:*:*:*", "matchCriteriaId": "002AC200-6AE2-4817-91D3-957DA3AC9787", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:2023:*:*:*:*:*:*:*", "matchCriteriaId": "E881C720-E487-463E-A364-A1F9EC3C1D24", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2019:*:*:*:*:*:*:*", "matchCriteriaId": "9275E76C-2A79-462A-A9D3-D0B6BBCDD0CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2020:*:*:*:*:*:*:*", "matchCriteriaId": "B7DFA12E-48C5-47B9-BD9F-1AFACBF4E1EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2021:*:*:*:*:*:*:*", "matchCriteriaId": "535A5D39-1C82-4301-9E5B-C9E0D75F38B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2022:*:*:*:*:*:*:*", "matchCriteriaId": "316615EC-BC9F-4B6A-8163-EBECC480EFDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2023:*:*:*:*:*:*:*", "matchCriteriaId": "546AFB2D-F78A-40C2-AC55-7D07EF0BDC7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2019:*:*:*:*:*:*:*", "matchCriteriaId": "AB3A878B-2142-404F-BCF4-BB508674C6C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2020:*:*:*:*:*:*:*", "matchCriteriaId": "64F2EC88-168D-4DD1-9ADA-3F9FA60D6E35", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2021:*:*:*:*:*:*:*", "matchCriteriaId": "5D73C803-7567-4C1D-B62A-C3C52369022D", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2022:*:*:*:*:*:*:*", "matchCriteriaId": "C5F77B03-3221-4564-B4FF-7BF7EEC1C5B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2023:*:*:*:*:*:*:*", "matchCriteriaId": "C6E001C0-0D7B-44ED-BBE8-E6635C45F988", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2019:*:*:*:*:*:*:*", "matchCriteriaId": "A10DE5AF-1718-4899-9238-CFFDC72D05B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2020:*:*:*:*:*:*:*", "matchCriteriaId": "E388264D-D2D4-4BE4-9097-8F547D73ABE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2021:*:*:*:*:*:*:*", "matchCriteriaId": "16611BAA-C200-4C8B-823F-1AB95F5E1317", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2022:*:*:*:*:*:*:*", "matchCriteriaId": "E2DC5114-48D2-4D85-8E80-B4BCB0FD78F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2023:*:*:*:*:*:*:*", "matchCriteriaId": "A2949D87-C1FA-43C3-8F1F-08ED7A64F302", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2019:*:*:*:*:*:*:*", "matchCriteriaId": "03682B7E-1CF1-4456-A51F-A6ADFC177935", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2020:*:*:*:*:*:*:*", "matchCriteriaId": "371C5F60-4959-40C7-93E1-A01510A95115", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2021:*:*:*:*:*:*:*", "matchCriteriaId": "D83FB4C7-B374-4907-8E2B-EEE61C8339E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2022:*:*:*:*:*:*:*", "matchCriteriaId": "601676EC-2EB4-45D0-B1AE-0980CBD68770", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2022:*:*:*:*:macos:*:*", "matchCriteriaId": "4A2EF334-E4E2-40DA-BD51-B74EE1E0ACCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2023:*:*:*:*:*:*:*", "matchCriteriaId": "99924DDE-3D49-4D37-A361-69B28E7B94A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2019:*:*:*:*:*:*:*", "matchCriteriaId": "04E05510-B21B-4DDD-88D7-CEB8963E1AFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2020:*:*:*:*:*:*:*", "matchCriteriaId": "D4CD010A-FDBC-40F9-95AC-0CD8388B85D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2021:*:*:*:*:*:*:*", "matchCriteriaId": "FC99E0F3-AA11-4390-A7C0-5BBFCDA94E3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2022:*:*:*:*:*:*:*", "matchCriteriaId": "33AA60CF-611C-45FC-92F8-7517D87B1645", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2023:*:*:*:*:*:*:*", "matchCriteriaId": "15A36E1F-964C-4DF2-91D1-D37ECEFC1C86", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2019:*:*:*:*:*:*:*", "matchCriteriaId": "19255CEC-6161-4D44-B87E-52E86DF4FBA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2020:*:*:*:*:*:*:*", "matchCriteriaId": "7147F378-DFB0-48A8-8B05-8777E1CC7F90", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2021:*:*:*:*:*:*:*", "matchCriteriaId": "3B5C858C-4A01-4916-BE3E-B9056D67CF5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2022:*:*:*:*:*:*:*", "matchCriteriaId": "7EB83A4A-D4C2-4509-BD49-15B9BBC7BF97", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2023:*:*:*:*:*:*:*", "matchCriteriaId": "DCF7910A-432F-419E-96E0-25D638A6F298", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2019:*:*:*:*:*:*:*", "matchCriteriaId": "3F608B1C-BA96-4EA8-A540-83870262CBC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2020:*:*:*:*:*:*:*", "matchCriteriaId": "7CFAAD19-6248-42CB-B177-EC2E5141A953", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2021:*:*:*:*:*:*:*", "matchCriteriaId": "1C52D90B-578B-4281-BF0E-B7CDA425ED05", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2022:*:*:*:*:*:*:*", "matchCriteriaId": "4C8AD4F3-AA82-49F5-A18A-85127FDB8B95", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2023:*:*:*:*:*:*:*", "matchCriteriaId": "DF8D9BA5-A043-42DB-A524-6728D3BF2B90", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2019:*:*:*:*:*:*:*", "matchCriteriaId": "4E536B0D-4C95-4589-981A-2F8A6C4B44DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2020:*:*:*:*:*:*:*", "matchCriteriaId": "3FBDD3AC-FA00-462F-AA13-5A75B5D50689", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2021:*:*:*:*:*:*:*", "matchCriteriaId": "73E2E9E8-2269-4729-8D8F-3C26974F5FD2", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2022:*:*:*:*:*:*:*", "matchCriteriaId": "452A1A75-C59A-43AB-9C43-BA49EB95C39C", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2023:*:*:*:*:*:*:*", "matchCriteriaId": "07CB7F37-E6D4-40F3-85BA-EC060E923505", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:-:*:*:*:*:*:*", "matchCriteriaId": "213232B9-A40B-436D-A66A-B65C49D59BE6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A malicious crafted .dwf or .pct file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process." }, { "lang": "es", "value": "Un archivo .dwf o .pct dise\u00f1ado de forma maliciosa cuando es consumido mediante la aplicaci\u00f3n DesignReview.exe podr\u00eda conllevar a una vulnerabilidad de corrupci\u00f3n de memoria por violaci\u00f3n de acceso de escritura. Esta vulnerabilidad, junto con otras, podr\u00eda conllevar a una ejecuci\u00f3n de c\u00f3digo en el contexto del proceso actual" } ], "id": "CVE-2022-42934", "lastModified": "2024-11-21T07:25:37.513", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-10-21T16:15:11.657", "references": [ { "source": "psirt@autodesk.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ], "sourceIdentifier": "psirt@autodesk.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-07-29 20:15
Modified
2024-11-21 06:56
Severity ?
Summary
A maliciously crafted TGA or PCX file may be used to write beyond the allocated buffer through DesignReview.exe application while parsing TGA and PCX files. This vulnerability may be exploited to execute arbitrary code.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@autodesk.com | https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0009 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0009 | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
autodesk | design_review | 2011 | |
autodesk | design_review | 2012 | |
autodesk | design_review | 2013 | |
autodesk | design_review | 2017 | |
autodesk | design_review | 2018 | |
autodesk | design_review | 2018 | |
autodesk | design_review | 2018 | |
autodesk | design_review | 2018 | |
autodesk | design_review | 2018 | |
autodesk | design_review | 2018 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autodesk:design_review:2011:-:*:*:*:*:*:*", "matchCriteriaId": "8E86021D-C654-4DC3-9D68-E64057566ABB", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2012:-:*:*:*:*:*:*", "matchCriteriaId": "D03EA125-FDF2-4A27-A020-0AC6E5F9C15E", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2013:-:*:*:*:*:*:*", "matchCriteriaId": "BCF10ED6-1D50-483D-9E03-9172D5CF24FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2017:-:*:*:*:*:*:*", "matchCriteriaId": "76C839AD-A4B3-4534-A7A8-17EBD59586E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:-:*:*:*:*:*:*", "matchCriteriaId": "213232B9-A40B-436D-A66A-B65C49D59BE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix:*:*:*:*:*:*", "matchCriteriaId": "2D0CF4DC-ACA5-41D0-B28E-CEB5D2C96F71", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix2:*:*:*:*:*:*", "matchCriteriaId": "84ED1789-A17F-48F7-A152-09D2A5C59254", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix3:*:*:*:*:*:*", "matchCriteriaId": "74819924-EB63-4BBF-9986-FEF6100EEE15", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix4:*:*:*:*:*:*", "matchCriteriaId": "100922EF-C773-4798-B352-B16FCAD48F36", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix5:*:*:*:*:*:*", "matchCriteriaId": "1C7E8CE3-8A75-4357-8722-17E2CE2378CC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A maliciously crafted TGA or PCX file may be used to write beyond the allocated buffer through DesignReview.exe application while parsing TGA and PCX files. This vulnerability may be exploited to execute arbitrary code." }, { "lang": "es", "value": "Un archivo TGA o PCX dise\u00f1ado de forma maliciosa puede usarse para escribir m\u00e1s all\u00e1 del b\u00fafer asignado mediante la aplicaci\u00f3n DesignReview.exe mientras analiza los archivos TGA y PCX. Esta vulnerabilidad puede ser explotada para ejecutar c\u00f3digo arbitrario" } ], "id": "CVE-2022-27865", "lastModified": "2024-11-21T06:56:21.473", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-07-29T20:15:12.217", "references": [ { "source": "psirt@autodesk.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0009" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0009" } ], "sourceIdentifier": "psirt@autodesk.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-07-29 20:15
Modified
2024-11-21 06:56
Severity ?
Summary
A maliciously crafted TIFF file when consumed through DesignReview.exe application can be forced to read beyond allocated boundaries when parsing the TIFF file. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
autodesk | design_review | 2011 | |
autodesk | design_review | 2012 | |
autodesk | design_review | 2013 | |
autodesk | design_review | 2017 | |
autodesk | design_review | 2018 | |
autodesk | design_review | 2018 | |
autodesk | design_review | 2018 | |
autodesk | design_review | 2018 | |
autodesk | design_review | 2018 | |
autodesk | design_review | 2018 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autodesk:design_review:2011:-:*:*:*:*:*:*", "matchCriteriaId": "8E86021D-C654-4DC3-9D68-E64057566ABB", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2012:-:*:*:*:*:*:*", "matchCriteriaId": "D03EA125-FDF2-4A27-A020-0AC6E5F9C15E", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2013:-:*:*:*:*:*:*", "matchCriteriaId": "BCF10ED6-1D50-483D-9E03-9172D5CF24FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2017:-:*:*:*:*:*:*", "matchCriteriaId": "76C839AD-A4B3-4534-A7A8-17EBD59586E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:-:*:*:*:*:*:*", "matchCriteriaId": "213232B9-A40B-436D-A66A-B65C49D59BE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix:*:*:*:*:*:*", "matchCriteriaId": "2D0CF4DC-ACA5-41D0-B28E-CEB5D2C96F71", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix2:*:*:*:*:*:*", "matchCriteriaId": "84ED1789-A17F-48F7-A152-09D2A5C59254", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix3:*:*:*:*:*:*", "matchCriteriaId": "74819924-EB63-4BBF-9986-FEF6100EEE15", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix4:*:*:*:*:*:*", "matchCriteriaId": "100922EF-C773-4798-B352-B16FCAD48F36", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix5:*:*:*:*:*:*", "matchCriteriaId": "1C7E8CE3-8A75-4357-8722-17E2CE2378CC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A maliciously crafted TIFF file when consumed through DesignReview.exe application can be forced to read beyond allocated boundaries when parsing the TIFF file. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process." }, { "lang": "es", "value": "Un archivo TIFF malicioso cuando se consume a trav\u00e9s de la aplicaci\u00f3n DesignReview.exe puede ser forzado a leer m\u00e1s all\u00e1 de los l\u00edmites asignados cuando se analiza el archivo TIFF. Esta vulnerabilidad, junto con otras, podr\u00eda conducir a la ejecuci\u00f3n de c\u00f3digo en el contexto del proceso actual" } ], "id": "CVE-2022-27866", "lastModified": "2024-11-21T06:56:21.577", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-07-29T20:15:12.257", "references": [ { "source": "psirt@autodesk.com", "tags": [ "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0009" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0009" } ], "sourceIdentifier": "psirt@autodesk.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-07-09 15:15
Modified
2024-11-21 05:57
Severity ?
Summary
A Type Confusion vulnerability in Autodesk Design Review 2018, 2017, 2013, 2012, 2011 can occur when processing a maliciously crafted PDF file. A malicious actor can leverage this to execute arbitrary code.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@autodesk.com | https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004 | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
autodesk | design_review | 2011 | |
autodesk | design_review | 2012 | |
autodesk | design_review | 2013 | |
autodesk | design_review | 2017 | |
autodesk | design_review | 2018 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autodesk:design_review:2011:*:*:*:*:*:*:*", "matchCriteriaId": "83CF6CDF-806C-4DC5-B572-C1C2BC2C25F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2012:*:*:*:*:*:*:*", "matchCriteriaId": "2A78B6F8-DF84-4E6C-A247-0F6D2F8CA679", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2013:*:*:*:*:*:*:*", "matchCriteriaId": "DCD2CA9B-16E1-4BE7-A4E1-A9817A503958", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2017:*:*:*:*:*:*:*", "matchCriteriaId": "31F2529F-ECF0-4568-BBDC-82B396A52332", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:*:*:*:*:*:*:*", "matchCriteriaId": "7D07C55F-1D23-4E2B-AC1E-67D735F800B7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Type Confusion vulnerability in Autodesk Design Review 2018, 2017, 2013, 2012, 2011 can occur when processing a maliciously crafted PDF file. A malicious actor can leverage this to execute arbitrary code." }, { "lang": "es", "value": "Una vulnerabilidad de confusi\u00f3n de tipo en Autodesk Design Review 2018, 2017, 2013, 2012, 2011 puede ocurrir al procesar un archivo PDF maliciosamente dise\u00f1ado. Un actor malicioso puede aprovechar esto para ejecutar c\u00f3digo arbitrario" } ], "id": "CVE-2021-27038", "lastModified": "2024-11-21T05:57:13.657", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-07-09T15:15:08.317", "references": [ { "source": "psirt@autodesk.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ], "sourceIdentifier": "psirt@autodesk.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-843" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-10-07 18:15
Modified
2024-11-21 06:23
Severity ?
Summary
A Memory Corruption vulnerability may lead to code execution through maliciously crafted DLL files through Autodesk Image Processing component.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
autodesk | autocad | * | |
autodesk | autocad | * | |
autodesk | autocad | * | |
autodesk | autocad | * | |
autodesk | autocad_advance_steel | * | |
autodesk | autocad_advance_steel | * | |
autodesk | autocad_advance_steel | * | |
autodesk | autocad_advance_steel | * | |
autodesk | autocad_architecture | * | |
autodesk | autocad_architecture | * | |
autodesk | autocad_architecture | * | |
autodesk | autocad_architecture | * | |
autodesk | autocad_civil_3d | * | |
autodesk | autocad_civil_3d | * | |
autodesk | autocad_civil_3d | * | |
autodesk | autocad_civil_3d | * | |
autodesk | autocad_electrical | * | |
autodesk | autocad_electrical | * | |
autodesk | autocad_electrical | * | |
autodesk | autocad_electrical | * | |
autodesk | autocad_lt | * | |
autodesk | autocad_lt | * | |
autodesk | autocad_lt | * | |
autodesk | autocad_lt | * | |
autodesk | autocad_lt | * | |
autodesk | autocad_lt | * | |
autodesk | autocad_lt | * | |
autodesk | autocad_map_3d | * | |
autodesk | autocad_map_3d | * | |
autodesk | autocad_map_3d | * | |
autodesk | autocad_map_3d | * | |
autodesk | autocad_mechanical | * | |
autodesk | autocad_mechanical | * | |
autodesk | autocad_mechanical | * | |
autodesk | autocad_mechanical | * | |
autodesk | autocad_mep | * | |
autodesk | autocad_mep | * | |
autodesk | autocad_mep | * | |
autodesk | autocad_mep | * | |
autodesk | autocad_plant_3d | * | |
autodesk | autocad_plant_3d | * | |
autodesk | autocad_plant_3d | * | |
autodesk | autocad_plant_3d | * | |
autodesk | design_review | 2018 | |
autodesk | design_review | 2018 | |
autodesk | design_review | 2018 | |
autodesk | design_review | 2018 | |
autodesk | dwg_trueview | * | |
autodesk | dwg_trueview | * | |
autodesk | dwg_trueview | * | |
autodesk | dwg_trueview | * | |
autodesk | fusion | * | |
autodesk | infrastructure_parts_editor | * | |
autodesk | infrastructure_parts_editor | * | |
autodesk | infrastructure_parts_editor | 2021 | |
autodesk | infrastructure_parts_editor | 2022 | |
autodesk | infraworks | * | |
autodesk | infraworks | * | |
autodesk | infraworks | * | |
autodesk | infraworks | 2019.3 | |
autodesk | infraworks | 2019.3 | |
autodesk | infraworks | 2019.3 | |
autodesk | infraworks | 2019.3 | |
autodesk | infraworks | 2020.2 | |
autodesk | infraworks | 2020.2 | |
autodesk | infraworks | 2020.2 | |
autodesk | infraworks | 2021.2 | |
autodesk | infraworks | 2021.2 | |
autodesk | infraworks | 2021.2 | |
autodesk | infraworks | 2022.0 | |
autodesk | infraworks | 2022.0 | |
autodesk | infraworks | 2022.1 | |
autodesk | inventor | * | |
autodesk | inventor | * | |
autodesk | inventor | * | |
autodesk | inventor | * | |
autodesk | navisworks | * | |
autodesk | navisworks | * | |
autodesk | navisworks | * | |
autodesk | navisworks | * | |
autodesk | revit | * | |
autodesk | revit | * | |
autodesk | revit | * | |
autodesk | revit | 2022 | |
autodesk | storm_and_sanitary_analysis | * | |
autodesk | storm_and_sanitary_analysis | * | |
autodesk | storm_and_sanitary_analysis | 2019 | |
autodesk | storm_and_sanitary_analysis | 2022 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*", "matchCriteriaId": "B0E84020-F179-4AF3-BF9C-6D27259B2847", "versionEndExcluding": "2019.1.4", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*", "matchCriteriaId": "87941CE7-7F89-4A09-BBE8-A0D829273A63", "versionEndExcluding": "2020.1.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*", "matchCriteriaId": "6F98B75B-1471-42A7-BCDA-95F7E65B7FD1", "versionEndExcluding": "2021.1.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C5F50DF-4792-4A29-BB21-5821CA5E3A22", "versionEndExcluding": "2022.1.2", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:*:*:*:*:*:*:*:*", "matchCriteriaId": "183990CB-4AA2-4EEE-8A14-8BF3AD203347", "versionEndExcluding": "2019.1.4", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:*:*:*:*:*:*:*:*", "matchCriteriaId": "4A416E4B-0910-45FB-B468-A6D159C6FD11", "versionEndExcluding": "2020.1.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A873E71-BC29-43BC-AFB2-98C06AE29F3B", "versionEndExcluding": "2021.1.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:*:*:*:*:*:*:*:*", "matchCriteriaId": "ED3A19CA-3D6A-42D6-86C5-6B4E494064FF", "versionEndExcluding": "2022.1.2", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*", "matchCriteriaId": "C9338B09-BCD8-4E67-A331-1B8D5FB5DA24", "versionEndExcluding": "2019.1.4", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*", "matchCriteriaId": "F616B84F-B471-43B9-BC5D-BA6CCE461F56", "versionEndExcluding": "2020.1.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*", "matchCriteriaId": "AD0B37E9-4987-4B96-9B31-6168961E1496", "versionEndExcluding": "2021.1.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9466EE6-83C9-492F-8486-F3E6C1DD9F5A", "versionEndExcluding": "2022.1.2", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "20371433-EA59-442E-947A-CF0A6AFD750C", "versionEndExcluding": "2019.1.4", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "AF176D9D-1FAE-42DA-B03C-5A3E66408D52", "versionEndExcluding": "2020.1.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "FD0CB6CF-53F6-4FED-8BE5-F3E31832237F", "versionEndExcluding": "2021.1.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "145CD700-BC3E-4F2B-82ED-FA51A0296C67", "versionEndExcluding": "2022.1.2", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*", "matchCriteriaId": "86CF88E0-A49D-4528-8135-6BE5C9E5DD7C", "versionEndExcluding": "2019.1.4", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*", "matchCriteriaId": "E716111F-273B-48DF-ADEA-44BADE5E7FEB", "versionEndExcluding": "2020.1.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*", "matchCriteriaId": "71FA0271-BE55-48AD-B88D-34645684E9DE", "versionEndExcluding": "2021.1.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*", "matchCriteriaId": "6DD91E39-A3D8-4806-A778-608FD6C29BB2", "versionEndExcluding": "2022.1.2", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:*:*:*", "matchCriteriaId": "77A1562A-07B8-4130-B319-1BE2800D8771", "versionEndExcluding": "2019.1.4", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:*:*:*", "matchCriteriaId": "0E59ACB5-8745-46A8-889E-005DEA38925B", "versionEndExcluding": "2020.1.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:macos:*:*", "matchCriteriaId": "8FB94403-A063-4BDB-BE35-E198BF128709", "versionEndExcluding": "2020.3.2", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:*:*:*", "matchCriteriaId": "CFFE146F-4AB2-45B2-9F87-52DD8DC26B85", "versionEndExcluding": "2021.1.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:macos:*:*", "matchCriteriaId": "06B6CA6F-48E9-4A48-B1A2-7537DCE9939E", "versionEndExcluding": "2021.2.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:*:*:*", "matchCriteriaId": "D01E3771-86FD-483D-BCCB-1B1CDD4C482F", "versionEndExcluding": "2022.1.2", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:macos:*:*", "matchCriteriaId": "EEC464C9-D741-41B4-B460-B4305BCD83FA", "versionEndExcluding": "2022.2.2", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "230F8974-9613-4B58-8621-67CCE81E208C", "versionEndExcluding": "2019.1.4", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "D9184783-2476-4ED0-9F05-CA2AC68446B3", "versionEndExcluding": "2020.1.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "752B8F1C-54E3-4985-97A4-86FBF13E6BFD", "versionEndExcluding": "2021.1.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "120326C3-E212-4341-A25D-BC3DD50CF228", "versionEndExcluding": "2022.1.2", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*", "matchCriteriaId": "AF0FCE36-8A0F-4CDB-86B3-D8F7875511FD", "versionEndExcluding": "2019.1.4", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*", "matchCriteriaId": "5BAA6D71-2B11-4490-A1C4-652347582EF6", "versionEndExcluding": "2020.1.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*", "matchCriteriaId": "6F78C528-605C-46F3-8CF0-828B682745B3", "versionEndExcluding": "2021.1.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*", "matchCriteriaId": "B117299A-C5FE-419F-9C1C-DF58A2772055", "versionEndExcluding": "2022.1.2", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*", "matchCriteriaId": "1075AC6C-C9E1-45EA-B371-B06235C6AA86", "versionEndExcluding": "2019.1.4", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*", "matchCriteriaId": "CBC04C9D-9E69-4CB7-BF7A-D3B8C0670114", "versionEndExcluding": "2020.1.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E140DC9-7000-48ED-A5C7-B23023DFB199", "versionEndExcluding": "2021.1.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*", "matchCriteriaId": "CC178212-E440-46E9-9F00-60A5516D4D72", "versionEndExcluding": "2022.1.2", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "C71A1AD7-4651-4FA9-9114-023E07DCB285", "versionEndExcluding": "2019.1.4", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "C2A2E5FC-9717-47C1-A223-F90DC572DAB0", "versionEndExcluding": "2020.1.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "984491F0-8303-4C6C-B884-00C032D797DD", "versionEndExcluding": "2021.1.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "7ED0DB1D-6F37-4C1B-B55E-42F3A4E34299", "versionEndExcluding": "2022.1.2", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:-:*:*:*:*:*:*", "matchCriteriaId": "213232B9-A40B-436D-A66A-B65C49D59BE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix:*:*:*:*:*:*", "matchCriteriaId": "2D0CF4DC-ACA5-41D0-B28E-CEB5D2C96F71", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix2:*:*:*:*:*:*", "matchCriteriaId": "84ED1789-A17F-48F7-A152-09D2A5C59254", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix3:*:*:*:*:*:*", "matchCriteriaId": "74819924-EB63-4BBF-9986-FEF6100EEE15", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:dwg_trueview:*:*:*:*:*:*:*:*", "matchCriteriaId": "3FB6CD03-F783-49F7-A9D2-C97C642E8B29", "versionEndExcluding": "2019.1.4", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:dwg_trueview:*:*:*:*:*:*:*:*", "matchCriteriaId": "7E9DF065-576B-46B8-9F64-A16D9CB25398", "versionEndExcluding": "2020.1.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:dwg_trueview:*:*:*:*:*:*:*:*", "matchCriteriaId": "631D559D-B4CB-4D6A-93A7-94C0CA9C232B", "versionEndExcluding": "2021.1.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:dwg_trueview:*:*:*:*:*:*:*:*", "matchCriteriaId": "713BBAEC-BE6D-40BC-9FB3-EBB906FB09BA", "versionEndExcluding": "2022.1.1", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E6ACCB8-A327-484D-A542-9BC30BA4554A", "versionEndExcluding": "2.0.11405", "versionStartIncluding": "2.0.10356", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infrastructure_parts_editor:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F3054F1-0ED3-4C71-90E0-764EC5757F6B", "versionEndExcluding": "2019.2.2", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infrastructure_parts_editor:*:*:*:*:*:*:*:*", "matchCriteriaId": "27BA9C22-0044-429D-AD68-C040DF0E1E34", "versionEndExcluding": "2020.0.2", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infrastructure_parts_editor:2021:*:*:*:*:*:*:*", "matchCriteriaId": "C59A098D-F778-49BB-8B02-61DFA956D456", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infrastructure_parts_editor:2022:*:*:*:*:*:*:*", "matchCriteriaId": "829ACB24-271D-440F-8723-FDAE2430373E", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:*:*:*:*:*:*:*:*", "matchCriteriaId": "36D46284-4E2E-4C56-B830-3C786D5A238F", "versionEndExcluding": "2019.3", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:*:*:*:*:*:*:*:*", "matchCriteriaId": "180513CE-CEC1-4FF7-B1CB-03835D6B8797", "versionEndExcluding": "2020.2", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:*:*:*:*:*:*:*:*", "matchCriteriaId": "FE68AFE1-0F44-4B37-87E5-C7D658186425", "versionEndExcluding": "2021.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:2019.3:-:*:*:*:*:*:*", "matchCriteriaId": "6974FEA3-2CDE-438D-A153-372A20E0338A", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:2019.3:hotfix_1:*:*:*:*:*:*", "matchCriteriaId": "3D85361A-B19D-444A-A075-73DF234C081B", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:2019.3:hotfix_2:*:*:*:*:*:*", "matchCriteriaId": "8F7898E8-E540-4775-943C-26A4A7A7BA60", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:2019.3:hotfix_3:*:*:*:*:*:*", "matchCriteriaId": "5C6290F4-E5E6-4146-982E-9CB0FC693B5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:2020.2:-:*:*:*:*:*:*", "matchCriteriaId": "9A3FB713-593D-4CF4-97EE-10498DF3B008", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:2020.2:hotfix_1:*:*:*:*:*:*", "matchCriteriaId": "1AF37BF8-1921-4D94-89D3-7890F2DA7048", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:2020.2:hotfix_2:*:*:*:*:*:*", "matchCriteriaId": "7A1EAD58-4213-4340-9019-543A223C155D", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:2021.2:-:*:*:*:*:*:*", "matchCriteriaId": "E8799159-8E69-4463-96D9-920E64A675B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:2021.2:hotfix_1:*:*:*:*:*:*", "matchCriteriaId": "DDAE8B1C-5799-4FCB-AA1F-E01C72C545B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:2021.2:hotfix_2:*:*:*:*:*:*", "matchCriteriaId": "BAB28476-5965-441D-AAEF-F76F7C599F3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:2022.0:-:*:*:*:*:*:*", "matchCriteriaId": "23B89172-71E0-482F-ABD9-E640EE18E1B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:2022.0:hotfix_1:*:*:*:*:*:*", "matchCriteriaId": "C7E432F3-925E-4120-9568-F679302A26B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:2022.1:*:*:*:*:*:*:*", "matchCriteriaId": "CA85576C-0D0E-4724-AC3F-0FCB9B4F7D2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:inventor:*:*:*:*:*:*:*:*", "matchCriteriaId": "CE08EFFE-4D11-4CFD-A013-4ABEB5D8D36F", "versionEndExcluding": "2019.6", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:inventor:*:*:*:*:*:*:*:*", "matchCriteriaId": "72B1AA4E-8E9C-40C3-9402-92B64BE19D83", "versionEndExcluding": "2020.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:inventor:*:*:*:*:*:*:*:*", "matchCriteriaId": "400ADD0C-F69C-41DF-B682-5DE90B2BC142", "versionEndExcluding": "2021.4", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:inventor:*:*:*:*:*:*:*:*", "matchCriteriaId": "D53B7E4C-4F2E-428D-A6CB-D4F2FB5865B0", "versionEndExcluding": "2022.2", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:navisworks:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA8C5795-C1E7-4E84-BAFD-A2F16DCD0B51", "versionEndExcluding": "2019.7", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:navisworks:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC07E959-8A9E-448D-9E4F-EF7D41C4B1A7", "versionEndExcluding": "2020.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:navisworks:*:*:*:*:*:*:*:*", "matchCriteriaId": "DD6A1944-2576-406F-8010-9080C68654D5", "versionEndExcluding": "2021.4", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:navisworks:*:*:*:*:*:*:*:*", "matchCriteriaId": "7AAFCE8D-C6FA-4179-BBD8-134F91261FEC", "versionEndExcluding": "2022.2", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:*", "matchCriteriaId": "34EEF338-800E-4350-BC57-815A4AC19523", "versionEndExcluding": "2019.2.4", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:*", "matchCriteriaId": "655285C9-9DBC-4DA3-8A53-7D87A2CFFBF7", "versionEndExcluding": "2020.2.6", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:*", "matchCriteriaId": "81E7B898-A0C4-4458-8389-3310A2A889AE", "versionEndExcluding": "2021.1.5", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:revit:2022:*:*:*:*:*:*:*", "matchCriteriaId": "70FD96A0-AC16-4E51-B4C1-6BB14C2D905A", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:storm_and_sanitary_analysis:*:*:*:*:*:*:*:*", "matchCriteriaId": "A7FDF255-2066-4115-83BC-D38DD09A8E6A", "versionEndExcluding": "2020.3.1", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:storm_and_sanitary_analysis:*:*:*:*:*:*:*:*", "matchCriteriaId": "C2591CF9-EA06-4EEC-9A13-80CE6864C08A", "versionEndExcluding": "2021.3.1", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:storm_and_sanitary_analysis:2019:*:*:*:*:*:*:*", "matchCriteriaId": "9AC1FC52-ACBC-4119-B42E-0297375B4522", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:storm_and_sanitary_analysis:2022:*:*:*:*:*:*:*", "matchCriteriaId": "AEAA2573-ABD3-4379-ADBE-A0508D2D38EF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Memory Corruption vulnerability may lead to code execution through maliciously crafted DLL files through Autodesk Image Processing component." }, { "lang": "es", "value": "Una vulnerabilidad de corrupci\u00f3n de memoria puede conllevar a una ejecuci\u00f3n de c\u00f3digo mediante archivos DLL dise\u00f1ados de forma maliciosa por medio del componente de procesamiento de im\u00e1genes de Autodesk" } ], "id": "CVE-2021-40163", "lastModified": "2024-11-21T06:23:42.163", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-10-07T18:15:14.460", "references": [ { "source": "psirt@autodesk.com", "tags": [ "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0011" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0011" } ], "sourceIdentifier": "psirt@autodesk.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-10-21 16:15
Modified
2024-11-21 07:25
Severity ?
Summary
A malicious crafted TGA file when consumed through DesignReview.exe application could lead to memory corruption vulnerability. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@autodesk.com | https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004 | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
autodesk | autocad | 2019 | |
autodesk | autocad | 2020 | |
autodesk | autocad | 2021 | |
autodesk | autocad | 2022 | |
autodesk | autocad | 2022 | |
autodesk | autocad | 2023 | |
autodesk | autocad_advance_steel | 2019 | |
autodesk | autocad_advance_steel | 2020 | |
autodesk | autocad_advance_steel | 2021 | |
autodesk | autocad_advance_steel | 2022 | |
autodesk | autocad_advance_steel | 2023 | |
autodesk | autocad_architecture | 2019 | |
autodesk | autocad_architecture | 2020 | |
autodesk | autocad_architecture | 2021 | |
autodesk | autocad_architecture | 2022 | |
autodesk | autocad_architecture | 2023 | |
autodesk | autocad_civil_3d | 2019 | |
autodesk | autocad_civil_3d | 2020 | |
autodesk | autocad_civil_3d | 2021 | |
autodesk | autocad_civil_3d | 2022 | |
autodesk | autocad_civil_3d | 2023 | |
autodesk | autocad_electrical | 2019 | |
autodesk | autocad_electrical | 2020 | |
autodesk | autocad_electrical | 2021 | |
autodesk | autocad_electrical | 2022 | |
autodesk | autocad_electrical | 2023 | |
autodesk | autocad_lt | 2019 | |
autodesk | autocad_lt | 2020 | |
autodesk | autocad_lt | 2021 | |
autodesk | autocad_lt | 2022 | |
autodesk | autocad_lt | 2022 | |
autodesk | autocad_lt | 2023 | |
autodesk | autocad_map_3d | 2019 | |
autodesk | autocad_map_3d | 2020 | |
autodesk | autocad_map_3d | 2021 | |
autodesk | autocad_map_3d | 2022 | |
autodesk | autocad_map_3d | 2023 | |
autodesk | autocad_mechanical | 2019 | |
autodesk | autocad_mechanical | 2020 | |
autodesk | autocad_mechanical | 2021 | |
autodesk | autocad_mechanical | 2022 | |
autodesk | autocad_mechanical | 2023 | |
autodesk | autocad_mep | 2019 | |
autodesk | autocad_mep | 2020 | |
autodesk | autocad_mep | 2021 | |
autodesk | autocad_mep | 2022 | |
autodesk | autocad_mep | 2023 | |
autodesk | autocad_plant_3d | 2019 | |
autodesk | autocad_plant_3d | 2020 | |
autodesk | autocad_plant_3d | 2021 | |
autodesk | autocad_plant_3d | 2022 | |
autodesk | autocad_plant_3d | 2023 | |
autodesk | design_review | 2018 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autodesk:autocad:2019:*:*:*:*:*:*:*", "matchCriteriaId": "411DC826-735A-4BEB-84BE-9250F97F612E", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2020:*:*:*:*:*:*:*", "matchCriteriaId": "E30E2562-D38E-4764-874E-5B2FCF5639E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2021:*:*:*:*:*:*:*", "matchCriteriaId": "88B2C295-D091-4C1D-8285-4309967707BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2022:*:*:*:*:*:*:*", "matchCriteriaId": "EACE09F2-A323-4E4B-9A35-4EBAE3864E6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2022:*:*:*:*:macos:*:*", "matchCriteriaId": "68FC54D1-B4FC-404E-9742-72F8340FE3C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2023:*:*:*:*:*:*:*", "matchCriteriaId": "2241C287-9396-4AD8-B93C-3596394AB2D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:2019:*:*:*:*:*:*:*", "matchCriteriaId": "9B1CAD53-7C63-4E5D-BD2E-364A7A87AA1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:2020:*:*:*:*:*:*:*", "matchCriteriaId": "127F5A79-8E66-4ABD-8D88-8891C6D670D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:2021:*:*:*:*:*:*:*", "matchCriteriaId": "37D8982C-E506-4988-AA97-BDF1B1C3D71A", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:2022:*:*:*:*:*:*:*", "matchCriteriaId": "002AC200-6AE2-4817-91D3-957DA3AC9787", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:2023:*:*:*:*:*:*:*", "matchCriteriaId": "E881C720-E487-463E-A364-A1F9EC3C1D24", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2019:*:*:*:*:*:*:*", "matchCriteriaId": "9275E76C-2A79-462A-A9D3-D0B6BBCDD0CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2020:*:*:*:*:*:*:*", "matchCriteriaId": "B7DFA12E-48C5-47B9-BD9F-1AFACBF4E1EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2021:*:*:*:*:*:*:*", "matchCriteriaId": "535A5D39-1C82-4301-9E5B-C9E0D75F38B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2022:*:*:*:*:*:*:*", "matchCriteriaId": "316615EC-BC9F-4B6A-8163-EBECC480EFDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2023:*:*:*:*:*:*:*", "matchCriteriaId": "546AFB2D-F78A-40C2-AC55-7D07EF0BDC7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2019:*:*:*:*:*:*:*", "matchCriteriaId": "AB3A878B-2142-404F-BCF4-BB508674C6C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2020:*:*:*:*:*:*:*", "matchCriteriaId": "64F2EC88-168D-4DD1-9ADA-3F9FA60D6E35", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2021:*:*:*:*:*:*:*", "matchCriteriaId": "5D73C803-7567-4C1D-B62A-C3C52369022D", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2022:*:*:*:*:*:*:*", "matchCriteriaId": "C5F77B03-3221-4564-B4FF-7BF7EEC1C5B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2023:*:*:*:*:*:*:*", "matchCriteriaId": "C6E001C0-0D7B-44ED-BBE8-E6635C45F988", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2019:*:*:*:*:*:*:*", "matchCriteriaId": "A10DE5AF-1718-4899-9238-CFFDC72D05B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2020:*:*:*:*:*:*:*", "matchCriteriaId": "E388264D-D2D4-4BE4-9097-8F547D73ABE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2021:*:*:*:*:*:*:*", "matchCriteriaId": "16611BAA-C200-4C8B-823F-1AB95F5E1317", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2022:*:*:*:*:*:*:*", "matchCriteriaId": "E2DC5114-48D2-4D85-8E80-B4BCB0FD78F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2023:*:*:*:*:*:*:*", "matchCriteriaId": "A2949D87-C1FA-43C3-8F1F-08ED7A64F302", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2019:*:*:*:*:*:*:*", "matchCriteriaId": "03682B7E-1CF1-4456-A51F-A6ADFC177935", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2020:*:*:*:*:*:*:*", "matchCriteriaId": "371C5F60-4959-40C7-93E1-A01510A95115", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2021:*:*:*:*:*:*:*", "matchCriteriaId": "D83FB4C7-B374-4907-8E2B-EEE61C8339E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2022:*:*:*:*:*:*:*", "matchCriteriaId": "601676EC-2EB4-45D0-B1AE-0980CBD68770", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2022:*:*:*:*:macos:*:*", "matchCriteriaId": "4A2EF334-E4E2-40DA-BD51-B74EE1E0ACCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2023:*:*:*:*:*:*:*", "matchCriteriaId": "99924DDE-3D49-4D37-A361-69B28E7B94A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2019:*:*:*:*:*:*:*", "matchCriteriaId": "04E05510-B21B-4DDD-88D7-CEB8963E1AFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2020:*:*:*:*:*:*:*", "matchCriteriaId": "D4CD010A-FDBC-40F9-95AC-0CD8388B85D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2021:*:*:*:*:*:*:*", "matchCriteriaId": "FC99E0F3-AA11-4390-A7C0-5BBFCDA94E3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2022:*:*:*:*:*:*:*", "matchCriteriaId": "33AA60CF-611C-45FC-92F8-7517D87B1645", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2023:*:*:*:*:*:*:*", "matchCriteriaId": "15A36E1F-964C-4DF2-91D1-D37ECEFC1C86", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2019:*:*:*:*:*:*:*", "matchCriteriaId": "19255CEC-6161-4D44-B87E-52E86DF4FBA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2020:*:*:*:*:*:*:*", "matchCriteriaId": "7147F378-DFB0-48A8-8B05-8777E1CC7F90", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2021:*:*:*:*:*:*:*", "matchCriteriaId": "3B5C858C-4A01-4916-BE3E-B9056D67CF5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2022:*:*:*:*:*:*:*", "matchCriteriaId": "7EB83A4A-D4C2-4509-BD49-15B9BBC7BF97", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2023:*:*:*:*:*:*:*", "matchCriteriaId": "DCF7910A-432F-419E-96E0-25D638A6F298", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2019:*:*:*:*:*:*:*", "matchCriteriaId": "3F608B1C-BA96-4EA8-A540-83870262CBC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2020:*:*:*:*:*:*:*", "matchCriteriaId": "7CFAAD19-6248-42CB-B177-EC2E5141A953", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2021:*:*:*:*:*:*:*", "matchCriteriaId": "1C52D90B-578B-4281-BF0E-B7CDA425ED05", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2022:*:*:*:*:*:*:*", "matchCriteriaId": "4C8AD4F3-AA82-49F5-A18A-85127FDB8B95", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2023:*:*:*:*:*:*:*", "matchCriteriaId": "DF8D9BA5-A043-42DB-A524-6728D3BF2B90", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2019:*:*:*:*:*:*:*", "matchCriteriaId": "4E536B0D-4C95-4589-981A-2F8A6C4B44DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2020:*:*:*:*:*:*:*", "matchCriteriaId": "3FBDD3AC-FA00-462F-AA13-5A75B5D50689", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2021:*:*:*:*:*:*:*", "matchCriteriaId": "73E2E9E8-2269-4729-8D8F-3C26974F5FD2", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2022:*:*:*:*:*:*:*", "matchCriteriaId": "452A1A75-C59A-43AB-9C43-BA49EB95C39C", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2023:*:*:*:*:*:*:*", "matchCriteriaId": "07CB7F37-E6D4-40F3-85BA-EC060E923505", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:-:*:*:*:*:*:*", "matchCriteriaId": "213232B9-A40B-436D-A66A-B65C49D59BE6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A malicious crafted TGA file when consumed through DesignReview.exe application could lead to memory corruption vulnerability. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process." }, { "lang": "es", "value": "Un archivo TGA dise\u00f1ado de forma maliciosa cuando es consumido mediante la aplicaci\u00f3n DesignReview.exe podr\u00eda conllevar a una vulnerabilidad de corrupci\u00f3n de memoria. Esta vulnerabilidad, junto con otras, podr\u00eda conllevar a una ejecuci\u00f3n de c\u00f3digo en el contexto del proceso actual" } ], "id": "CVE-2022-42939", "lastModified": "2024-11-21T07:25:38.227", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-10-21T16:15:11.863", "references": [ { "source": "psirt@autodesk.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ], "sourceIdentifier": "psirt@autodesk.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-08-23 20:15
Modified
2024-11-21 04:48
Severity ?
Summary
Use-after-free vulnerability in Autodesk Design Review versions 2011, 2012, 2013, and 2018. An attacker may trick a user into opening a malicious DWF file that may leverage a use-after-free vulnerability, which may result in code execution.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@autodesk.com | https://www.autodesk.com/trust/security-advisories/adsk-sa-2019-0002 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.autodesk.com/trust/security-advisories/adsk-sa-2019-0002 | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
autodesk | design_review | 2011 | |
autodesk | design_review | 2012 | |
autodesk | design_review | 2013 | |
autodesk | design_review | 2018 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autodesk:design_review:2011:*:*:*:*:*:*:*", "matchCriteriaId": "83CF6CDF-806C-4DC5-B572-C1C2BC2C25F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2012:*:*:*:*:*:*:*", "matchCriteriaId": "2A78B6F8-DF84-4E6C-A247-0F6D2F8CA679", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2013:*:*:*:*:*:*:*", "matchCriteriaId": "DCD2CA9B-16E1-4BE7-A4E1-A9817A503958", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:*:*:*:*:*:*:*", "matchCriteriaId": "7D07C55F-1D23-4E2B-AC1E-67D735F800B7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Use-after-free vulnerability in Autodesk Design Review versions 2011, 2012, 2013, and 2018. An attacker may trick a user into opening a malicious DWF file that may leverage a use-after-free vulnerability, which may result in code execution." }, { "lang": "es", "value": "Una vulnerabilidad de uso de la memoria previamente liberada en las versiones 2011, 2012, 2013 y 2018 de Autodesk Design Review. Un atacante puede enga\u00f1ar a un usuario para que abra un archivo DWF malicioso que puede aprovechar una vulnerabilidad de uso libre posterior, que puede provocar la ejecuci\u00f3n del c\u00f3digo." } ], "id": "CVE-2019-7363", "lastModified": "2024-11-21T04:48:06.217", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-08-23T20:15:10.613", "references": [ { "source": "psirt@autodesk.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2019-0002" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2019-0002" } ], "sourceIdentifier": "psirt@autodesk.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-07-09 15:15
Modified
2024-11-21 05:57
Severity ?
Summary
A maliciously crafted TIFF and PCX file can be forced to read and write beyond allocated boundaries when parsing the TIFF and PCX file for based overflow. This vulnerability can be exploited to execute arbitrary code.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
autodesk | autocad | * | |
autodesk | design_review | 2011 | |
autodesk | design_review | 2012 | |
autodesk | design_review | 2013 | |
autodesk | design_review | 2017 | |
autodesk | design_review | 2018 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*", "matchCriteriaId": "EC1B9EF9-2E54-46BC-A7BB-71FB77918562", "versionEndExcluding": "2022.1.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2011:*:*:*:*:*:*:*", "matchCriteriaId": "83CF6CDF-806C-4DC5-B572-C1C2BC2C25F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2012:*:*:*:*:*:*:*", "matchCriteriaId": "2A78B6F8-DF84-4E6C-A247-0F6D2F8CA679", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2013:*:*:*:*:*:*:*", "matchCriteriaId": "DCD2CA9B-16E1-4BE7-A4E1-A9817A503958", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2017:*:*:*:*:*:*:*", "matchCriteriaId": "31F2529F-ECF0-4568-BBDC-82B396A52332", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:*:*:*:*:*:*:*", "matchCriteriaId": "7D07C55F-1D23-4E2B-AC1E-67D735F800B7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A maliciously crafted TIFF and PCX file can be forced to read and write beyond allocated boundaries when parsing the TIFF and PCX file for based overflow. This vulnerability can be exploited to execute arbitrary code." }, { "lang": "es", "value": "Un archivo TIFF y PCX malicioso puede ser forzado a leer y escribir m\u00e1s all\u00e1 de los l\u00edmites asignados cuando se analiza el archivo TIFF y PCX para el desbordamiento basado. Esta vulnerabilidad puede ser explotada para ejecutar c\u00f3digo arbitrario" } ], "id": "CVE-2021-27039", "lastModified": "2024-11-21T05:57:13.760", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-07-09T15:15:08.407", "references": [ { "source": "psirt@autodesk.com", "tags": [ "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ], "sourceIdentifier": "psirt@autodesk.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-10-07 20:00
Modified
2024-11-21 00:51
Severity ?
Summary
Directory traversal vulnerability in the CExpressViewerControl class in the DWF Viewer ActiveX control (AdView.dll 9.0.0.96), as used in Revit Architecture 2009 SP2 and Autodesk Design Review 2009, allows remote attackers to overwrite arbitrary files via "..\" sequences in the argument to the SaveAS method.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://retrogod.altervista.org/9sg_autodesk_revit_arch_2009_exploit.html | Exploit | |
cve@mitre.org | http://secunia.com/advisories/31989 | Vendor Advisory | |
cve@mitre.org | http://securityreason.com/securityalert/4361 | ||
cve@mitre.org | http://www.securityfocus.com/archive/1/496847/100/0/threaded | ||
cve@mitre.org | http://www.securityfocus.com/bid/31487 | ||
cve@mitre.org | http://www.vupen.com/english/advisories/2008/2704 | ||
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/45519 | ||
cve@mitre.org | https://www.exploit-db.com/exploits/6630 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://retrogod.altervista.org/9sg_autodesk_revit_arch_2009_exploit.html | Exploit | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31989 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://securityreason.com/securityalert/4361 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/496847/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/31487 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/2704 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/45519 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.exploit-db.com/exploits/6630 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
autodesk | design_review | 2009 | |
autodesk | dwf_viewer | * | |
autodesk | revit_architecture | 2009 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autodesk:design_review:2009:*:*:*:*:*:*:*", "matchCriteriaId": "D015F7C3-BBFB-418C-8B50-2047AE1E142E", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:dwf_viewer:*:*:*:*:*:*:*:*", "matchCriteriaId": "9E11496F-A4A3-48B2-BFD4-D00D13BD9E2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:revit_architecture:2009:sp2:*:*:*:*:*:*", "matchCriteriaId": "877A0489-AC5E-4A8C-827B-EDD6EF62E0BD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in the CExpressViewerControl class in the DWF Viewer ActiveX control (AdView.dll 9.0.0.96), as used in Revit Architecture 2009 SP2 and Autodesk Design Review 2009, allows remote attackers to overwrite arbitrary files via \"..\\\" sequences in the argument to the SaveAS method." }, { "lang": "es", "value": "Vulnerabilidad de salto de directorio en la clase CExpressViewerControl en el control ActiveX DWF Viewer (AdView.dll 9.0.0.96), utilizado en Revit Architecture 2009 SP2 y Autodesk Design Review 2009, que permite a los atacante remotos sobrescribir arbitrariamente archivos a trav\u00e9s de secuencias \"..\\\" en el argumento to del m\u00e9todo SaveAs." } ], "id": "CVE-2008-4471", "lastModified": "2024-11-21T00:51:45.487", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2008-10-07T20:00:17.390", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://retrogod.altervista.org/9sg_autodesk_revit_arch_2009_exploit.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31989" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/4361" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/496847/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/31487" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/2704" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45519" }, { "source": "cve@mitre.org", "url": "https://www.exploit-db.com/exploits/6630" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://retrogod.altervista.org/9sg_autodesk_revit_arch_2009_exploit.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31989" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/4361" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/496847/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/31487" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/2704" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45519" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/6630" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-10-21 16:15
Modified
2024-11-21 07:25
Severity ?
Summary
A malicious crafted TGA file when consumed through DesignReview.exe application could lead to memory corruption vulnerability. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@autodesk.com | https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004 | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
autodesk | autocad | 2019 | |
autodesk | autocad | 2020 | |
autodesk | autocad | 2021 | |
autodesk | autocad | 2022 | |
autodesk | autocad | 2022 | |
autodesk | autocad | 2023 | |
autodesk | autocad_advance_steel | 2019 | |
autodesk | autocad_advance_steel | 2020 | |
autodesk | autocad_advance_steel | 2021 | |
autodesk | autocad_advance_steel | 2022 | |
autodesk | autocad_advance_steel | 2023 | |
autodesk | autocad_architecture | 2019 | |
autodesk | autocad_architecture | 2020 | |
autodesk | autocad_architecture | 2021 | |
autodesk | autocad_architecture | 2022 | |
autodesk | autocad_architecture | 2023 | |
autodesk | autocad_civil_3d | 2019 | |
autodesk | autocad_civil_3d | 2020 | |
autodesk | autocad_civil_3d | 2021 | |
autodesk | autocad_civil_3d | 2022 | |
autodesk | autocad_civil_3d | 2023 | |
autodesk | autocad_electrical | 2019 | |
autodesk | autocad_electrical | 2020 | |
autodesk | autocad_electrical | 2021 | |
autodesk | autocad_electrical | 2022 | |
autodesk | autocad_electrical | 2023 | |
autodesk | autocad_lt | 2019 | |
autodesk | autocad_lt | 2020 | |
autodesk | autocad_lt | 2021 | |
autodesk | autocad_lt | 2022 | |
autodesk | autocad_lt | 2022 | |
autodesk | autocad_lt | 2023 | |
autodesk | autocad_map_3d | 2019 | |
autodesk | autocad_map_3d | 2020 | |
autodesk | autocad_map_3d | 2021 | |
autodesk | autocad_map_3d | 2022 | |
autodesk | autocad_map_3d | 2023 | |
autodesk | autocad_mechanical | 2019 | |
autodesk | autocad_mechanical | 2020 | |
autodesk | autocad_mechanical | 2021 | |
autodesk | autocad_mechanical | 2022 | |
autodesk | autocad_mechanical | 2023 | |
autodesk | autocad_mep | 2019 | |
autodesk | autocad_mep | 2020 | |
autodesk | autocad_mep | 2021 | |
autodesk | autocad_mep | 2022 | |
autodesk | autocad_mep | 2023 | |
autodesk | autocad_plant_3d | 2019 | |
autodesk | autocad_plant_3d | 2020 | |
autodesk | autocad_plant_3d | 2021 | |
autodesk | autocad_plant_3d | 2022 | |
autodesk | autocad_plant_3d | 2023 | |
autodesk | design_review | 2018 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autodesk:autocad:2019:*:*:*:*:*:*:*", "matchCriteriaId": "411DC826-735A-4BEB-84BE-9250F97F612E", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2020:*:*:*:*:*:*:*", "matchCriteriaId": "E30E2562-D38E-4764-874E-5B2FCF5639E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2021:*:*:*:*:*:*:*", "matchCriteriaId": "88B2C295-D091-4C1D-8285-4309967707BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2022:*:*:*:*:*:*:*", "matchCriteriaId": "EACE09F2-A323-4E4B-9A35-4EBAE3864E6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2022:*:*:*:*:macos:*:*", "matchCriteriaId": "68FC54D1-B4FC-404E-9742-72F8340FE3C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2023:*:*:*:*:*:*:*", "matchCriteriaId": "2241C287-9396-4AD8-B93C-3596394AB2D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:2019:*:*:*:*:*:*:*", "matchCriteriaId": "9B1CAD53-7C63-4E5D-BD2E-364A7A87AA1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:2020:*:*:*:*:*:*:*", "matchCriteriaId": "127F5A79-8E66-4ABD-8D88-8891C6D670D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:2021:*:*:*:*:*:*:*", "matchCriteriaId": "37D8982C-E506-4988-AA97-BDF1B1C3D71A", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:2022:*:*:*:*:*:*:*", "matchCriteriaId": "002AC200-6AE2-4817-91D3-957DA3AC9787", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:2023:*:*:*:*:*:*:*", "matchCriteriaId": "E881C720-E487-463E-A364-A1F9EC3C1D24", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2019:*:*:*:*:*:*:*", "matchCriteriaId": "9275E76C-2A79-462A-A9D3-D0B6BBCDD0CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2020:*:*:*:*:*:*:*", "matchCriteriaId": "B7DFA12E-48C5-47B9-BD9F-1AFACBF4E1EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2021:*:*:*:*:*:*:*", "matchCriteriaId": "535A5D39-1C82-4301-9E5B-C9E0D75F38B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2022:*:*:*:*:*:*:*", "matchCriteriaId": "316615EC-BC9F-4B6A-8163-EBECC480EFDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2023:*:*:*:*:*:*:*", "matchCriteriaId": "546AFB2D-F78A-40C2-AC55-7D07EF0BDC7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2019:*:*:*:*:*:*:*", "matchCriteriaId": "AB3A878B-2142-404F-BCF4-BB508674C6C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2020:*:*:*:*:*:*:*", "matchCriteriaId": "64F2EC88-168D-4DD1-9ADA-3F9FA60D6E35", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2021:*:*:*:*:*:*:*", "matchCriteriaId": "5D73C803-7567-4C1D-B62A-C3C52369022D", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2022:*:*:*:*:*:*:*", "matchCriteriaId": "C5F77B03-3221-4564-B4FF-7BF7EEC1C5B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2023:*:*:*:*:*:*:*", "matchCriteriaId": "C6E001C0-0D7B-44ED-BBE8-E6635C45F988", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2019:*:*:*:*:*:*:*", "matchCriteriaId": "A10DE5AF-1718-4899-9238-CFFDC72D05B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2020:*:*:*:*:*:*:*", "matchCriteriaId": "E388264D-D2D4-4BE4-9097-8F547D73ABE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2021:*:*:*:*:*:*:*", "matchCriteriaId": "16611BAA-C200-4C8B-823F-1AB95F5E1317", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2022:*:*:*:*:*:*:*", "matchCriteriaId": "E2DC5114-48D2-4D85-8E80-B4BCB0FD78F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2023:*:*:*:*:*:*:*", "matchCriteriaId": "A2949D87-C1FA-43C3-8F1F-08ED7A64F302", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2019:*:*:*:*:*:*:*", "matchCriteriaId": "03682B7E-1CF1-4456-A51F-A6ADFC177935", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2020:*:*:*:*:*:*:*", "matchCriteriaId": "371C5F60-4959-40C7-93E1-A01510A95115", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2021:*:*:*:*:*:*:*", "matchCriteriaId": "D83FB4C7-B374-4907-8E2B-EEE61C8339E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2022:*:*:*:*:*:*:*", "matchCriteriaId": "601676EC-2EB4-45D0-B1AE-0980CBD68770", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2022:*:*:*:*:macos:*:*", "matchCriteriaId": "4A2EF334-E4E2-40DA-BD51-B74EE1E0ACCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2023:*:*:*:*:*:*:*", "matchCriteriaId": "99924DDE-3D49-4D37-A361-69B28E7B94A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2019:*:*:*:*:*:*:*", "matchCriteriaId": "04E05510-B21B-4DDD-88D7-CEB8963E1AFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2020:*:*:*:*:*:*:*", "matchCriteriaId": "D4CD010A-FDBC-40F9-95AC-0CD8388B85D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2021:*:*:*:*:*:*:*", "matchCriteriaId": "FC99E0F3-AA11-4390-A7C0-5BBFCDA94E3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2022:*:*:*:*:*:*:*", "matchCriteriaId": "33AA60CF-611C-45FC-92F8-7517D87B1645", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2023:*:*:*:*:*:*:*", "matchCriteriaId": "15A36E1F-964C-4DF2-91D1-D37ECEFC1C86", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2019:*:*:*:*:*:*:*", "matchCriteriaId": "19255CEC-6161-4D44-B87E-52E86DF4FBA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2020:*:*:*:*:*:*:*", "matchCriteriaId": "7147F378-DFB0-48A8-8B05-8777E1CC7F90", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2021:*:*:*:*:*:*:*", "matchCriteriaId": "3B5C858C-4A01-4916-BE3E-B9056D67CF5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2022:*:*:*:*:*:*:*", "matchCriteriaId": "7EB83A4A-D4C2-4509-BD49-15B9BBC7BF97", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2023:*:*:*:*:*:*:*", "matchCriteriaId": "DCF7910A-432F-419E-96E0-25D638A6F298", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2019:*:*:*:*:*:*:*", "matchCriteriaId": "3F608B1C-BA96-4EA8-A540-83870262CBC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2020:*:*:*:*:*:*:*", "matchCriteriaId": "7CFAAD19-6248-42CB-B177-EC2E5141A953", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2021:*:*:*:*:*:*:*", "matchCriteriaId": "1C52D90B-578B-4281-BF0E-B7CDA425ED05", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2022:*:*:*:*:*:*:*", "matchCriteriaId": "4C8AD4F3-AA82-49F5-A18A-85127FDB8B95", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2023:*:*:*:*:*:*:*", "matchCriteriaId": "DF8D9BA5-A043-42DB-A524-6728D3BF2B90", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2019:*:*:*:*:*:*:*", "matchCriteriaId": "4E536B0D-4C95-4589-981A-2F8A6C4B44DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2020:*:*:*:*:*:*:*", "matchCriteriaId": "3FBDD3AC-FA00-462F-AA13-5A75B5D50689", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2021:*:*:*:*:*:*:*", "matchCriteriaId": "73E2E9E8-2269-4729-8D8F-3C26974F5FD2", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2022:*:*:*:*:*:*:*", "matchCriteriaId": "452A1A75-C59A-43AB-9C43-BA49EB95C39C", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2023:*:*:*:*:*:*:*", "matchCriteriaId": "07CB7F37-E6D4-40F3-85BA-EC060E923505", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:-:*:*:*:*:*:*", "matchCriteriaId": "213232B9-A40B-436D-A66A-B65C49D59BE6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A malicious crafted TGA file when consumed through DesignReview.exe application could lead to memory corruption vulnerability. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process." }, { "lang": "es", "value": "Un archivo TGA dise\u00f1ado de forma maliciosa cuando es consumido mediante la aplicaci\u00f3n DesignReview.exe podr\u00eda conllevar a una vulnerabilidad de corrupci\u00f3n de memoria. Esta vulnerabilidad, junto con otras, podr\u00eda conllevar a una ejecuci\u00f3n de c\u00f3digo en el contexto del proceso actual" } ], "id": "CVE-2022-42938", "lastModified": "2024-11-21T07:25:38.100", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-10-21T16:15:11.823", "references": [ { "source": "psirt@autodesk.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ], "sourceIdentifier": "psirt@autodesk.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-10-21 16:15
Modified
2024-11-21 07:25
Severity ?
Summary
A malicious crafted dwf or .pct file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by read access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@autodesk.com | https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004 | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
autodesk | autocad | 2019 | |
autodesk | autocad | 2020 | |
autodesk | autocad | 2021 | |
autodesk | autocad | 2022 | |
autodesk | autocad | 2022 | |
autodesk | autocad | 2023 | |
autodesk | autocad_advance_steel | 2019 | |
autodesk | autocad_advance_steel | 2020 | |
autodesk | autocad_advance_steel | 2021 | |
autodesk | autocad_advance_steel | 2022 | |
autodesk | autocad_advance_steel | 2023 | |
autodesk | autocad_architecture | 2019 | |
autodesk | autocad_architecture | 2020 | |
autodesk | autocad_architecture | 2021 | |
autodesk | autocad_architecture | 2022 | |
autodesk | autocad_architecture | 2023 | |
autodesk | autocad_civil_3d | 2019 | |
autodesk | autocad_civil_3d | 2020 | |
autodesk | autocad_civil_3d | 2021 | |
autodesk | autocad_civil_3d | 2022 | |
autodesk | autocad_civil_3d | 2023 | |
autodesk | autocad_electrical | 2019 | |
autodesk | autocad_electrical | 2020 | |
autodesk | autocad_electrical | 2021 | |
autodesk | autocad_electrical | 2022 | |
autodesk | autocad_electrical | 2023 | |
autodesk | autocad_lt | 2019 | |
autodesk | autocad_lt | 2020 | |
autodesk | autocad_lt | 2021 | |
autodesk | autocad_lt | 2022 | |
autodesk | autocad_lt | 2022 | |
autodesk | autocad_lt | 2023 | |
autodesk | autocad_map_3d | 2019 | |
autodesk | autocad_map_3d | 2020 | |
autodesk | autocad_map_3d | 2021 | |
autodesk | autocad_map_3d | 2022 | |
autodesk | autocad_map_3d | 2023 | |
autodesk | autocad_mechanical | 2019 | |
autodesk | autocad_mechanical | 2020 | |
autodesk | autocad_mechanical | 2021 | |
autodesk | autocad_mechanical | 2022 | |
autodesk | autocad_mechanical | 2023 | |
autodesk | autocad_mep | 2019 | |
autodesk | autocad_mep | 2020 | |
autodesk | autocad_mep | 2021 | |
autodesk | autocad_mep | 2022 | |
autodesk | autocad_mep | 2023 | |
autodesk | autocad_plant_3d | 2019 | |
autodesk | autocad_plant_3d | 2020 | |
autodesk | autocad_plant_3d | 2021 | |
autodesk | autocad_plant_3d | 2022 | |
autodesk | autocad_plant_3d | 2023 | |
autodesk | design_review | 2018 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autodesk:autocad:2019:*:*:*:*:*:*:*", "matchCriteriaId": "411DC826-735A-4BEB-84BE-9250F97F612E", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2020:*:*:*:*:*:*:*", "matchCriteriaId": "E30E2562-D38E-4764-874E-5B2FCF5639E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2021:*:*:*:*:*:*:*", "matchCriteriaId": "88B2C295-D091-4C1D-8285-4309967707BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2022:*:*:*:*:*:*:*", "matchCriteriaId": "EACE09F2-A323-4E4B-9A35-4EBAE3864E6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2022:*:*:*:*:macos:*:*", "matchCriteriaId": "68FC54D1-B4FC-404E-9742-72F8340FE3C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2023:*:*:*:*:*:*:*", "matchCriteriaId": "2241C287-9396-4AD8-B93C-3596394AB2D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:2019:*:*:*:*:*:*:*", "matchCriteriaId": "9B1CAD53-7C63-4E5D-BD2E-364A7A87AA1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:2020:*:*:*:*:*:*:*", "matchCriteriaId": "127F5A79-8E66-4ABD-8D88-8891C6D670D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:2021:*:*:*:*:*:*:*", "matchCriteriaId": "37D8982C-E506-4988-AA97-BDF1B1C3D71A", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:2022:*:*:*:*:*:*:*", "matchCriteriaId": "002AC200-6AE2-4817-91D3-957DA3AC9787", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:2023:*:*:*:*:*:*:*", "matchCriteriaId": "E881C720-E487-463E-A364-A1F9EC3C1D24", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2019:*:*:*:*:*:*:*", "matchCriteriaId": "9275E76C-2A79-462A-A9D3-D0B6BBCDD0CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2020:*:*:*:*:*:*:*", "matchCriteriaId": "B7DFA12E-48C5-47B9-BD9F-1AFACBF4E1EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2021:*:*:*:*:*:*:*", "matchCriteriaId": "535A5D39-1C82-4301-9E5B-C9E0D75F38B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2022:*:*:*:*:*:*:*", "matchCriteriaId": "316615EC-BC9F-4B6A-8163-EBECC480EFDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2023:*:*:*:*:*:*:*", "matchCriteriaId": "546AFB2D-F78A-40C2-AC55-7D07EF0BDC7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2019:*:*:*:*:*:*:*", "matchCriteriaId": "AB3A878B-2142-404F-BCF4-BB508674C6C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2020:*:*:*:*:*:*:*", "matchCriteriaId": "64F2EC88-168D-4DD1-9ADA-3F9FA60D6E35", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2021:*:*:*:*:*:*:*", "matchCriteriaId": "5D73C803-7567-4C1D-B62A-C3C52369022D", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2022:*:*:*:*:*:*:*", "matchCriteriaId": "C5F77B03-3221-4564-B4FF-7BF7EEC1C5B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2023:*:*:*:*:*:*:*", "matchCriteriaId": "C6E001C0-0D7B-44ED-BBE8-E6635C45F988", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2019:*:*:*:*:*:*:*", "matchCriteriaId": "A10DE5AF-1718-4899-9238-CFFDC72D05B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2020:*:*:*:*:*:*:*", "matchCriteriaId": "E388264D-D2D4-4BE4-9097-8F547D73ABE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2021:*:*:*:*:*:*:*", "matchCriteriaId": "16611BAA-C200-4C8B-823F-1AB95F5E1317", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2022:*:*:*:*:*:*:*", "matchCriteriaId": "E2DC5114-48D2-4D85-8E80-B4BCB0FD78F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2023:*:*:*:*:*:*:*", "matchCriteriaId": "A2949D87-C1FA-43C3-8F1F-08ED7A64F302", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2019:*:*:*:*:*:*:*", "matchCriteriaId": "03682B7E-1CF1-4456-A51F-A6ADFC177935", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2020:*:*:*:*:*:*:*", "matchCriteriaId": "371C5F60-4959-40C7-93E1-A01510A95115", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2021:*:*:*:*:*:*:*", "matchCriteriaId": "D83FB4C7-B374-4907-8E2B-EEE61C8339E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2022:*:*:*:*:*:*:*", "matchCriteriaId": "601676EC-2EB4-45D0-B1AE-0980CBD68770", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2022:*:*:*:*:macos:*:*", "matchCriteriaId": "4A2EF334-E4E2-40DA-BD51-B74EE1E0ACCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2023:*:*:*:*:*:*:*", "matchCriteriaId": "99924DDE-3D49-4D37-A361-69B28E7B94A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2019:*:*:*:*:*:*:*", "matchCriteriaId": "04E05510-B21B-4DDD-88D7-CEB8963E1AFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2020:*:*:*:*:*:*:*", "matchCriteriaId": "D4CD010A-FDBC-40F9-95AC-0CD8388B85D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2021:*:*:*:*:*:*:*", "matchCriteriaId": "FC99E0F3-AA11-4390-A7C0-5BBFCDA94E3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2022:*:*:*:*:*:*:*", "matchCriteriaId": "33AA60CF-611C-45FC-92F8-7517D87B1645", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2023:*:*:*:*:*:*:*", "matchCriteriaId": "15A36E1F-964C-4DF2-91D1-D37ECEFC1C86", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2019:*:*:*:*:*:*:*", "matchCriteriaId": "19255CEC-6161-4D44-B87E-52E86DF4FBA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2020:*:*:*:*:*:*:*", "matchCriteriaId": "7147F378-DFB0-48A8-8B05-8777E1CC7F90", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2021:*:*:*:*:*:*:*", "matchCriteriaId": "3B5C858C-4A01-4916-BE3E-B9056D67CF5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2022:*:*:*:*:*:*:*", "matchCriteriaId": "7EB83A4A-D4C2-4509-BD49-15B9BBC7BF97", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2023:*:*:*:*:*:*:*", "matchCriteriaId": "DCF7910A-432F-419E-96E0-25D638A6F298", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2019:*:*:*:*:*:*:*", "matchCriteriaId": "3F608B1C-BA96-4EA8-A540-83870262CBC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2020:*:*:*:*:*:*:*", "matchCriteriaId": "7CFAAD19-6248-42CB-B177-EC2E5141A953", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2021:*:*:*:*:*:*:*", "matchCriteriaId": "1C52D90B-578B-4281-BF0E-B7CDA425ED05", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2022:*:*:*:*:*:*:*", "matchCriteriaId": "4C8AD4F3-AA82-49F5-A18A-85127FDB8B95", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2023:*:*:*:*:*:*:*", "matchCriteriaId": "DF8D9BA5-A043-42DB-A524-6728D3BF2B90", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2019:*:*:*:*:*:*:*", "matchCriteriaId": "4E536B0D-4C95-4589-981A-2F8A6C4B44DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2020:*:*:*:*:*:*:*", "matchCriteriaId": "3FBDD3AC-FA00-462F-AA13-5A75B5D50689", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2021:*:*:*:*:*:*:*", "matchCriteriaId": "73E2E9E8-2269-4729-8D8F-3C26974F5FD2", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2022:*:*:*:*:*:*:*", "matchCriteriaId": "452A1A75-C59A-43AB-9C43-BA49EB95C39C", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2023:*:*:*:*:*:*:*", "matchCriteriaId": "07CB7F37-E6D4-40F3-85BA-EC060E923505", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:-:*:*:*:*:*:*", "matchCriteriaId": "213232B9-A40B-436D-A66A-B65C49D59BE6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A malicious crafted dwf or .pct file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by read access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process." }, { "lang": "es", "value": "Un archivo dwf o .pct malicioso dise\u00f1ado cuando es consumido mediante la aplicaci\u00f3n DesignReview.exe podr\u00eda conllevar a una vulnerabilidad de corrupci\u00f3n de memoria por violaci\u00f3n de acceso de lectura. Esta vulnerabilidad, junto con otras, podr\u00eda conllevar a una ejecuci\u00f3n de c\u00f3digo en el contexto del proceso actual" } ], "id": "CVE-2022-42942", "lastModified": "2024-11-21T07:25:38.647", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-10-21T16:15:11.993", "references": [ { "source": "psirt@autodesk.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ], "sourceIdentifier": "psirt@autodesk.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-07-09 15:15
Modified
2024-11-21 05:57
Severity ?
Summary
A heap-based buffer overflow could occur while parsing PICT, PCX, RCL or TIFF files in Autodesk Design Review 2018, 2017, 2013, 2012, 2011. This vulnerability can be exploited to execute arbitrary code.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@autodesk.com | https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0003 | Vendor Advisory | |
psirt@autodesk.com | https://www.zerodayinitiative.com/advisories/ZDI-21-1125/ | Third Party Advisory, VDB Entry | |
psirt@autodesk.com | https://www.zerodayinitiative.com/advisories/ZDI-21-1126/ | Third Party Advisory, VDB Entry | |
psirt@autodesk.com | https://www.zerodayinitiative.com/advisories/ZDI-21-1127/ | Third Party Advisory, VDB Entry | |
psirt@autodesk.com | https://www.zerodayinitiative.com/advisories/ZDI-21-1128/ | Third Party Advisory, VDB Entry | |
psirt@autodesk.com | https://www.zerodayinitiative.com/advisories/ZDI-21-1129/ | Third Party Advisory, VDB Entry | |
psirt@autodesk.com | https://www.zerodayinitiative.com/advisories/ZDI-21-1130/ | Third Party Advisory, VDB Entry | |
psirt@autodesk.com | https://www.zerodayinitiative.com/advisories/ZDI-21-1131/ | Third Party Advisory, VDB Entry | |
psirt@autodesk.com | https://www.zerodayinitiative.com/advisories/ZDI-21-1132/ | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0003 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.zerodayinitiative.com/advisories/ZDI-21-1125/ | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.zerodayinitiative.com/advisories/ZDI-21-1126/ | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.zerodayinitiative.com/advisories/ZDI-21-1127/ | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.zerodayinitiative.com/advisories/ZDI-21-1128/ | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.zerodayinitiative.com/advisories/ZDI-21-1129/ | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.zerodayinitiative.com/advisories/ZDI-21-1130/ | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.zerodayinitiative.com/advisories/ZDI-21-1131/ | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.zerodayinitiative.com/advisories/ZDI-21-1132/ | Third Party Advisory, VDB Entry |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
autodesk | design_review | 2011 | |
autodesk | design_review | 2012 | |
autodesk | design_review | 2013 | |
autodesk | design_review | 2017 | |
autodesk | design_review | 2018 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autodesk:design_review:2011:*:*:*:*:*:*:*", "matchCriteriaId": "83CF6CDF-806C-4DC5-B572-C1C2BC2C25F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2012:*:*:*:*:*:*:*", "matchCriteriaId": "2A78B6F8-DF84-4E6C-A247-0F6D2F8CA679", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2013:*:*:*:*:*:*:*", "matchCriteriaId": "DCD2CA9B-16E1-4BE7-A4E1-A9817A503958", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2017:*:*:*:*:*:*:*", "matchCriteriaId": "31F2529F-ECF0-4568-BBDC-82B396A52332", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:*:*:*:*:*:*:*", "matchCriteriaId": "7D07C55F-1D23-4E2B-AC1E-67D735F800B7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A heap-based buffer overflow could occur while parsing PICT, PCX, RCL or TIFF files in Autodesk Design Review 2018, 2017, 2013, 2012, 2011. This vulnerability can be exploited to execute arbitrary code." }, { "lang": "es", "value": "Podr\u00eda producirse un desbordamiento del b\u00fafer basado en la pila mientras se analizan archivos PICT, PCX, RCL o TIFF en Autodesk Design Review 2018, 2017, 2013, 2012, 2011. Esta vulnerabilidad puede ser explotada para ejecutar c\u00f3digo arbitrario." } ], "id": "CVE-2021-27034", "lastModified": "2024-11-21T05:57:13.180", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-07-09T15:15:07.720", "references": [ { "source": "psirt@autodesk.com", "tags": [ "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0003" }, { "source": "psirt@autodesk.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1125/" }, { "source": "psirt@autodesk.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1126/" }, { "source": "psirt@autodesk.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1127/" }, { "source": "psirt@autodesk.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1128/" }, { "source": "psirt@autodesk.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1129/" }, { "source": "psirt@autodesk.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1130/" }, { "source": "psirt@autodesk.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1131/" }, { "source": "psirt@autodesk.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1132/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0003" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1125/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1126/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1127/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1128/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1129/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1130/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1131/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-1132/" } ], "sourceIdentifier": "psirt@autodesk.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-10-07 18:15
Modified
2024-11-21 06:23
Severity ?
Summary
A maliciously crafted PNG file in Autodesk Image Processing component may be used to attempt to free an object that has already been freed while parsing them. This vulnerability may be exploited by attackers to execute arbitrary code.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
autodesk | autocad | * | |
autodesk | autocad | * | |
autodesk | autocad | * | |
autodesk | autocad | * | |
autodesk | autocad_advance_steel | * | |
autodesk | autocad_advance_steel | * | |
autodesk | autocad_advance_steel | * | |
autodesk | autocad_advance_steel | * | |
autodesk | autocad_architecture | * | |
autodesk | autocad_architecture | * | |
autodesk | autocad_architecture | * | |
autodesk | autocad_architecture | * | |
autodesk | autocad_civil_3d | * | |
autodesk | autocad_civil_3d | * | |
autodesk | autocad_civil_3d | * | |
autodesk | autocad_civil_3d | * | |
autodesk | autocad_electrical | * | |
autodesk | autocad_electrical | * | |
autodesk | autocad_electrical | * | |
autodesk | autocad_electrical | * | |
autodesk | autocad_lt | * | |
autodesk | autocad_lt | * | |
autodesk | autocad_lt | * | |
autodesk | autocad_lt | * | |
autodesk | autocad_lt | * | |
autodesk | autocad_lt | * | |
autodesk | autocad_lt | * | |
autodesk | autocad_map_3d | * | |
autodesk | autocad_map_3d | * | |
autodesk | autocad_map_3d | * | |
autodesk | autocad_map_3d | * | |
autodesk | autocad_mechanical | * | |
autodesk | autocad_mechanical | * | |
autodesk | autocad_mechanical | * | |
autodesk | autocad_mechanical | * | |
autodesk | autocad_mep | * | |
autodesk | autocad_mep | * | |
autodesk | autocad_mep | * | |
autodesk | autocad_mep | * | |
autodesk | autocad_plant_3d | * | |
autodesk | autocad_plant_3d | * | |
autodesk | autocad_plant_3d | * | |
autodesk | autocad_plant_3d | * | |
autodesk | design_review | 2018 | |
autodesk | design_review | 2018 | |
autodesk | design_review | 2018 | |
autodesk | design_review | 2018 | |
autodesk | dwg_trueview | * | |
autodesk | dwg_trueview | * | |
autodesk | dwg_trueview | * | |
autodesk | dwg_trueview | * | |
autodesk | fusion | * | |
autodesk | infrastructure_parts_editor | * | |
autodesk | infrastructure_parts_editor | * | |
autodesk | infrastructure_parts_editor | 2021 | |
autodesk | infrastructure_parts_editor | 2022 | |
autodesk | infraworks | * | |
autodesk | infraworks | * | |
autodesk | infraworks | * | |
autodesk | infraworks | 2019.3 | |
autodesk | infraworks | 2019.3 | |
autodesk | infraworks | 2019.3 | |
autodesk | infraworks | 2019.3 | |
autodesk | infraworks | 2020.2 | |
autodesk | infraworks | 2020.2 | |
autodesk | infraworks | 2020.2 | |
autodesk | infraworks | 2021.2 | |
autodesk | infraworks | 2021.2 | |
autodesk | infraworks | 2021.2 | |
autodesk | infraworks | 2022.0 | |
autodesk | infraworks | 2022.0 | |
autodesk | infraworks | 2022.1 | |
autodesk | inventor | * | |
autodesk | inventor | * | |
autodesk | inventor | * | |
autodesk | inventor | * | |
autodesk | navisworks | * | |
autodesk | navisworks | * | |
autodesk | navisworks | * | |
autodesk | navisworks | * | |
autodesk | revit | * | |
autodesk | revit | * | |
autodesk | revit | * | |
autodesk | revit | 2022 | |
autodesk | storm_and_sanitary_analysis | * | |
autodesk | storm_and_sanitary_analysis | * | |
autodesk | storm_and_sanitary_analysis | 2019 | |
autodesk | storm_and_sanitary_analysis | 2022 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*", "matchCriteriaId": "B0E84020-F179-4AF3-BF9C-6D27259B2847", "versionEndExcluding": "2019.1.4", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*", "matchCriteriaId": "87941CE7-7F89-4A09-BBE8-A0D829273A63", "versionEndExcluding": "2020.1.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*", "matchCriteriaId": "6F98B75B-1471-42A7-BCDA-95F7E65B7FD1", "versionEndExcluding": "2021.1.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C5F50DF-4792-4A29-BB21-5821CA5E3A22", "versionEndExcluding": "2022.1.2", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:*:*:*:*:*:*:*:*", "matchCriteriaId": "183990CB-4AA2-4EEE-8A14-8BF3AD203347", "versionEndExcluding": "2019.1.4", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:*:*:*:*:*:*:*:*", "matchCriteriaId": "4A416E4B-0910-45FB-B468-A6D159C6FD11", "versionEndExcluding": "2020.1.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A873E71-BC29-43BC-AFB2-98C06AE29F3B", "versionEndExcluding": "2021.1.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:*:*:*:*:*:*:*:*", "matchCriteriaId": "ED3A19CA-3D6A-42D6-86C5-6B4E494064FF", "versionEndExcluding": "2022.1.2", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*", "matchCriteriaId": "C9338B09-BCD8-4E67-A331-1B8D5FB5DA24", "versionEndExcluding": "2019.1.4", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*", "matchCriteriaId": "F616B84F-B471-43B9-BC5D-BA6CCE461F56", "versionEndExcluding": "2020.1.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*", "matchCriteriaId": "AD0B37E9-4987-4B96-9B31-6168961E1496", "versionEndExcluding": "2021.1.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9466EE6-83C9-492F-8486-F3E6C1DD9F5A", "versionEndExcluding": "2022.1.2", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "20371433-EA59-442E-947A-CF0A6AFD750C", "versionEndExcluding": "2019.1.4", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "AF176D9D-1FAE-42DA-B03C-5A3E66408D52", "versionEndExcluding": "2020.1.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "FD0CB6CF-53F6-4FED-8BE5-F3E31832237F", "versionEndExcluding": "2021.1.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "145CD700-BC3E-4F2B-82ED-FA51A0296C67", "versionEndExcluding": "2022.1.2", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*", "matchCriteriaId": "86CF88E0-A49D-4528-8135-6BE5C9E5DD7C", "versionEndExcluding": "2019.1.4", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*", "matchCriteriaId": "E716111F-273B-48DF-ADEA-44BADE5E7FEB", "versionEndExcluding": "2020.1.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*", "matchCriteriaId": "71FA0271-BE55-48AD-B88D-34645684E9DE", "versionEndExcluding": "2021.1.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*", "matchCriteriaId": "6DD91E39-A3D8-4806-A778-608FD6C29BB2", "versionEndExcluding": "2022.1.2", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:*:*:*", "matchCriteriaId": "77A1562A-07B8-4130-B319-1BE2800D8771", "versionEndExcluding": "2019.1.4", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:*:*:*", "matchCriteriaId": "0E59ACB5-8745-46A8-889E-005DEA38925B", "versionEndExcluding": "2020.1.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:macos:*:*", "matchCriteriaId": "8FB94403-A063-4BDB-BE35-E198BF128709", "versionEndExcluding": "2020.3.2", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:*:*:*", "matchCriteriaId": "CFFE146F-4AB2-45B2-9F87-52DD8DC26B85", "versionEndExcluding": "2021.1.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:macos:*:*", "matchCriteriaId": "06B6CA6F-48E9-4A48-B1A2-7537DCE9939E", "versionEndExcluding": "2021.2.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:*:*:*", "matchCriteriaId": "D01E3771-86FD-483D-BCCB-1B1CDD4C482F", "versionEndExcluding": "2022.1.2", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:macos:*:*", "matchCriteriaId": "EEC464C9-D741-41B4-B460-B4305BCD83FA", "versionEndExcluding": "2022.2.2", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "230F8974-9613-4B58-8621-67CCE81E208C", "versionEndExcluding": "2019.1.4", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "D9184783-2476-4ED0-9F05-CA2AC68446B3", "versionEndExcluding": "2020.1.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "752B8F1C-54E3-4985-97A4-86FBF13E6BFD", "versionEndExcluding": "2021.1.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "120326C3-E212-4341-A25D-BC3DD50CF228", "versionEndExcluding": "2022.1.2", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*", "matchCriteriaId": "AF0FCE36-8A0F-4CDB-86B3-D8F7875511FD", "versionEndExcluding": "2019.1.4", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*", "matchCriteriaId": "5BAA6D71-2B11-4490-A1C4-652347582EF6", "versionEndExcluding": "2020.1.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*", "matchCriteriaId": "6F78C528-605C-46F3-8CF0-828B682745B3", "versionEndExcluding": "2021.1.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*", "matchCriteriaId": "B117299A-C5FE-419F-9C1C-DF58A2772055", "versionEndExcluding": "2022.1.2", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*", "matchCriteriaId": "1075AC6C-C9E1-45EA-B371-B06235C6AA86", "versionEndExcluding": "2019.1.4", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*", "matchCriteriaId": "CBC04C9D-9E69-4CB7-BF7A-D3B8C0670114", "versionEndExcluding": "2020.1.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E140DC9-7000-48ED-A5C7-B23023DFB199", "versionEndExcluding": "2021.1.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*", "matchCriteriaId": "CC178212-E440-46E9-9F00-60A5516D4D72", "versionEndExcluding": "2022.1.2", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "C71A1AD7-4651-4FA9-9114-023E07DCB285", "versionEndExcluding": "2019.1.4", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "C2A2E5FC-9717-47C1-A223-F90DC572DAB0", "versionEndExcluding": "2020.1.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "984491F0-8303-4C6C-B884-00C032D797DD", "versionEndExcluding": "2021.1.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*", "matchCriteriaId": "7ED0DB1D-6F37-4C1B-B55E-42F3A4E34299", "versionEndExcluding": "2022.1.2", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:-:*:*:*:*:*:*", "matchCriteriaId": "213232B9-A40B-436D-A66A-B65C49D59BE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix:*:*:*:*:*:*", "matchCriteriaId": "2D0CF4DC-ACA5-41D0-B28E-CEB5D2C96F71", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix2:*:*:*:*:*:*", "matchCriteriaId": "84ED1789-A17F-48F7-A152-09D2A5C59254", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix3:*:*:*:*:*:*", "matchCriteriaId": "74819924-EB63-4BBF-9986-FEF6100EEE15", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:dwg_trueview:*:*:*:*:*:*:*:*", "matchCriteriaId": "3FB6CD03-F783-49F7-A9D2-C97C642E8B29", "versionEndExcluding": "2019.1.4", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:dwg_trueview:*:*:*:*:*:*:*:*", "matchCriteriaId": "7E9DF065-576B-46B8-9F64-A16D9CB25398", "versionEndExcluding": "2020.1.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:dwg_trueview:*:*:*:*:*:*:*:*", "matchCriteriaId": "631D559D-B4CB-4D6A-93A7-94C0CA9C232B", "versionEndExcluding": "2021.1.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:dwg_trueview:*:*:*:*:*:*:*:*", "matchCriteriaId": "713BBAEC-BE6D-40BC-9FB3-EBB906FB09BA", "versionEndExcluding": "2022.1.1", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E6ACCB8-A327-484D-A542-9BC30BA4554A", "versionEndExcluding": "2.0.11405", "versionStartIncluding": "2.0.10356", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infrastructure_parts_editor:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F3054F1-0ED3-4C71-90E0-764EC5757F6B", "versionEndExcluding": "2019.2.2", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infrastructure_parts_editor:*:*:*:*:*:*:*:*", "matchCriteriaId": "27BA9C22-0044-429D-AD68-C040DF0E1E34", "versionEndExcluding": "2020.0.2", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infrastructure_parts_editor:2021:*:*:*:*:*:*:*", "matchCriteriaId": "C59A098D-F778-49BB-8B02-61DFA956D456", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infrastructure_parts_editor:2022:*:*:*:*:*:*:*", "matchCriteriaId": "829ACB24-271D-440F-8723-FDAE2430373E", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:*:*:*:*:*:*:*:*", "matchCriteriaId": "36D46284-4E2E-4C56-B830-3C786D5A238F", "versionEndExcluding": "2019.3", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:*:*:*:*:*:*:*:*", "matchCriteriaId": "180513CE-CEC1-4FF7-B1CB-03835D6B8797", "versionEndExcluding": "2020.2", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:*:*:*:*:*:*:*:*", "matchCriteriaId": "FE68AFE1-0F44-4B37-87E5-C7D658186425", "versionEndExcluding": "2021.2", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:2019.3:-:*:*:*:*:*:*", "matchCriteriaId": "6974FEA3-2CDE-438D-A153-372A20E0338A", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:2019.3:hotfix_1:*:*:*:*:*:*", "matchCriteriaId": "3D85361A-B19D-444A-A075-73DF234C081B", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:2019.3:hotfix_2:*:*:*:*:*:*", "matchCriteriaId": "8F7898E8-E540-4775-943C-26A4A7A7BA60", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:2019.3:hotfix_3:*:*:*:*:*:*", "matchCriteriaId": "5C6290F4-E5E6-4146-982E-9CB0FC693B5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:2020.2:-:*:*:*:*:*:*", "matchCriteriaId": "9A3FB713-593D-4CF4-97EE-10498DF3B008", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:2020.2:hotfix_1:*:*:*:*:*:*", "matchCriteriaId": "1AF37BF8-1921-4D94-89D3-7890F2DA7048", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:2020.2:hotfix_2:*:*:*:*:*:*", "matchCriteriaId": "7A1EAD58-4213-4340-9019-543A223C155D", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:2021.2:-:*:*:*:*:*:*", "matchCriteriaId": "E8799159-8E69-4463-96D9-920E64A675B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:2021.2:hotfix_1:*:*:*:*:*:*", "matchCriteriaId": "DDAE8B1C-5799-4FCB-AA1F-E01C72C545B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:2021.2:hotfix_2:*:*:*:*:*:*", "matchCriteriaId": "BAB28476-5965-441D-AAEF-F76F7C599F3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:2022.0:-:*:*:*:*:*:*", "matchCriteriaId": "23B89172-71E0-482F-ABD9-E640EE18E1B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:2022.0:hotfix_1:*:*:*:*:*:*", "matchCriteriaId": "C7E432F3-925E-4120-9568-F679302A26B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:infraworks:2022.1:*:*:*:*:*:*:*", "matchCriteriaId": "CA85576C-0D0E-4724-AC3F-0FCB9B4F7D2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:inventor:*:*:*:*:*:*:*:*", "matchCriteriaId": "CE08EFFE-4D11-4CFD-A013-4ABEB5D8D36F", "versionEndExcluding": "2019.6", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:inventor:*:*:*:*:*:*:*:*", "matchCriteriaId": "72B1AA4E-8E9C-40C3-9402-92B64BE19D83", "versionEndExcluding": "2020.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:inventor:*:*:*:*:*:*:*:*", "matchCriteriaId": "400ADD0C-F69C-41DF-B682-5DE90B2BC142", "versionEndExcluding": "2021.4", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:inventor:*:*:*:*:*:*:*:*", "matchCriteriaId": "D53B7E4C-4F2E-428D-A6CB-D4F2FB5865B0", "versionEndExcluding": "2022.2", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:navisworks:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA8C5795-C1E7-4E84-BAFD-A2F16DCD0B51", "versionEndExcluding": "2019.7", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:navisworks:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC07E959-8A9E-448D-9E4F-EF7D41C4B1A7", "versionEndExcluding": "2020.5", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:navisworks:*:*:*:*:*:*:*:*", "matchCriteriaId": "DD6A1944-2576-406F-8010-9080C68654D5", "versionEndExcluding": "2021.4", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:navisworks:*:*:*:*:*:*:*:*", "matchCriteriaId": "7AAFCE8D-C6FA-4179-BBD8-134F91261FEC", "versionEndExcluding": "2022.2", "versionStartIncluding": "2022", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:*", "matchCriteriaId": "34EEF338-800E-4350-BC57-815A4AC19523", "versionEndExcluding": "2019.2.4", "versionStartIncluding": "2019", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:*", "matchCriteriaId": "655285C9-9DBC-4DA3-8A53-7D87A2CFFBF7", "versionEndExcluding": "2020.2.6", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:*", "matchCriteriaId": "81E7B898-A0C4-4458-8389-3310A2A889AE", "versionEndExcluding": "2021.1.5", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:revit:2022:*:*:*:*:*:*:*", "matchCriteriaId": "70FD96A0-AC16-4E51-B4C1-6BB14C2D905A", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:storm_and_sanitary_analysis:*:*:*:*:*:*:*:*", "matchCriteriaId": "A7FDF255-2066-4115-83BC-D38DD09A8E6A", "versionEndExcluding": "2020.3.1", "versionStartIncluding": "2020", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:storm_and_sanitary_analysis:*:*:*:*:*:*:*:*", "matchCriteriaId": "C2591CF9-EA06-4EEC-9A13-80CE6864C08A", "versionEndExcluding": "2021.3.1", "versionStartIncluding": "2021", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:storm_and_sanitary_analysis:2019:*:*:*:*:*:*:*", "matchCriteriaId": "9AC1FC52-ACBC-4119-B42E-0297375B4522", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:storm_and_sanitary_analysis:2022:*:*:*:*:*:*:*", "matchCriteriaId": "AEAA2573-ABD3-4379-ADBE-A0508D2D38EF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A maliciously crafted PNG file in Autodesk Image Processing component may be used to attempt to free an object that has already been freed while parsing them. This vulnerability may be exploited by attackers to execute arbitrary code." }, { "lang": "es", "value": "Un archivo PNG dise\u00f1ado de forma maliciosa en el componente de procesamiento de im\u00e1genes de Autodesk puede usarse para intentar liberar un objeto que ya ha sido liberado mientras es analizado. Esta vulnerabilidad puede ser explotada por atacantes para ejecutar c\u00f3digo arbitrario" } ], "id": "CVE-2021-40166", "lastModified": "2024-11-21T06:23:42.607", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-10-07T18:15:14.743", "references": [ { "source": "psirt@autodesk.com", "tags": [ "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0011" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0011" } ], "sourceIdentifier": "psirt@autodesk.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-07-09 15:15
Modified
2024-11-21 05:57
Severity ?
Summary
A maliciously crafted PNG, PDF or DWF file in Autodesk Design Review 2018, 2017, 2013, 2012, 2011 can be used to attempt to free an object that has already been freed while parsing them. This vulnerability may be exploited by remote malicious actors to execute arbitrary code.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
autodesk | design_review | 2011 | |
autodesk | design_review | 2012 | |
autodesk | design_review | 2013 | |
autodesk | design_review | 2017 | |
autodesk | design_review | 2018 | |
autodesk | design_review | 2018 | |
autodesk | design_review | 2018 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autodesk:design_review:2011:*:*:*:*:*:*:*", "matchCriteriaId": "83CF6CDF-806C-4DC5-B572-C1C2BC2C25F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2012:*:*:*:*:*:*:*", "matchCriteriaId": "2A78B6F8-DF84-4E6C-A247-0F6D2F8CA679", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2013:*:*:*:*:*:*:*", "matchCriteriaId": "DCD2CA9B-16E1-4BE7-A4E1-A9817A503958", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2017:*:*:*:*:*:*:*", "matchCriteriaId": "31F2529F-ECF0-4568-BBDC-82B396A52332", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:-:*:*:*:*:*:*", "matchCriteriaId": "213232B9-A40B-436D-A66A-B65C49D59BE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix:*:*:*:*:*:*", "matchCriteriaId": "2D0CF4DC-ACA5-41D0-B28E-CEB5D2C96F71", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix2:*:*:*:*:*:*", "matchCriteriaId": "84ED1789-A17F-48F7-A152-09D2A5C59254", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A maliciously crafted PNG, PDF or DWF file in Autodesk Design Review 2018, 2017, 2013, 2012, 2011 can be used to attempt to free an object that has already been freed while parsing them. This vulnerability may be exploited by remote malicious actors to execute arbitrary code." }, { "lang": "es", "value": "Un archivo PNG, PDF o DWF malintencionado en Autodesk Design Review 2018, 2017, 2013, 2012, 2011 puede ser utilizado para intentar liberar un objeto que ya ha sido liberado mientras los analiza. Esta vulnerabilidad puede ser explotada por actores maliciosos remotos para ejecutar c\u00f3digo arbitrario" } ], "id": "CVE-2021-27037", "lastModified": "2024-11-21T05:57:13.540", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-07-09T15:15:08.190", "references": [ { "source": "psirt@autodesk.com", "tags": [ "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ], "sourceIdentifier": "psirt@autodesk.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-04-18 17:15
Modified
2024-11-21 06:55
Severity ?
Summary
A malicious crafted TGA file when consumed through DesignReview.exe application could lead to memory corruption vulnerability. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
autodesk | design_review | 2011 | |
autodesk | design_review | 2012 | |
autodesk | design_review | 2013 | |
autodesk | design_review | 2017 | |
autodesk | design_review | 2018 | |
autodesk | design_review | 2018 | |
autodesk | design_review | 2018 | |
autodesk | design_review | 2018 | |
autodesk | design_review | 2018 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autodesk:design_review:2011:*:*:*:*:*:*:*", "matchCriteriaId": "83CF6CDF-806C-4DC5-B572-C1C2BC2C25F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2012:*:*:*:*:*:*:*", "matchCriteriaId": "2A78B6F8-DF84-4E6C-A247-0F6D2F8CA679", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2013:*:*:*:*:*:*:*", "matchCriteriaId": "DCD2CA9B-16E1-4BE7-A4E1-A9817A503958", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2017:*:*:*:*:*:*:*", "matchCriteriaId": "31F2529F-ECF0-4568-BBDC-82B396A52332", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:-:*:*:*:*:*:*", "matchCriteriaId": "213232B9-A40B-436D-A66A-B65C49D59BE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix:*:*:*:*:*:*", "matchCriteriaId": "2D0CF4DC-ACA5-41D0-B28E-CEB5D2C96F71", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix2:*:*:*:*:*:*", "matchCriteriaId": "84ED1789-A17F-48F7-A152-09D2A5C59254", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix3:*:*:*:*:*:*", "matchCriteriaId": "74819924-EB63-4BBF-9986-FEF6100EEE15", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix4:*:*:*:*:*:*", "matchCriteriaId": "100922EF-C773-4798-B352-B16FCAD48F36", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A malicious crafted TGA file when consumed through DesignReview.exe application could lead to memory corruption vulnerability. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process." }, { "lang": "es", "value": "Un archivo TGA dise\u00f1ado de forma maliciosa cuando es consumido mediante la aplicaci\u00f3n DesignReview.exe podr\u00eda conllevar a una vulnerabilidad de corrupci\u00f3n de memoria. Esta vulnerabilidad, junto con otras, podr\u00eda conllevar a una ejecuci\u00f3n de c\u00f3digo en el contexto del proceso actual" } ], "id": "CVE-2022-27526", "lastModified": "2024-11-21T06:55:53.020", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-04-18T17:15:16.857", "references": [ { "source": "psirt@autodesk.com", "tags": [ "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ], "sourceIdentifier": "psirt@autodesk.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-10-14 17:15
Modified
2024-11-21 07:23
Severity ?
Summary
A maliciously crafted PCT file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@autodesk.com | https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0022 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0022 | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
autodesk | design_review | 2018 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autodesk:design_review:2018:-:*:*:*:*:*:*", "matchCriteriaId": "213232B9-A40B-436D-A66A-B65C49D59BE6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A maliciously crafted PCT file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process." }, { "lang": "es", "value": "Un archivo PCT dise\u00f1ado de forma maliciosa cuando es consumido mediante la aplicaci\u00f3n DesignReview.exe podr\u00eda conllevar a una vulnerabilidad de corrupci\u00f3n de memoria por violaci\u00f3n de acceso de escritura. Esta vulnerabilidad, junto con otras, podr\u00eda conllevar a una ejecuci\u00f3n de c\u00f3digo en el contexto del proceso actual" } ], "id": "CVE-2022-41306", "lastModified": "2024-11-21T07:23:00.663", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-10-14T17:15:16.500", "references": [ { "source": "psirt@autodesk.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0022" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0022" } ], "sourceIdentifier": "psirt@autodesk.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-10-21 16:15
Modified
2024-11-21 07:25
Severity ?
Summary
A malicious crafted .dwf or .pct file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@autodesk.com | https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004 | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
autodesk | autocad | 2019 | |
autodesk | autocad | 2020 | |
autodesk | autocad | 2021 | |
autodesk | autocad | 2022 | |
autodesk | autocad | 2022 | |
autodesk | autocad | 2023 | |
autodesk | autocad_advance_steel | 2019 | |
autodesk | autocad_advance_steel | 2020 | |
autodesk | autocad_advance_steel | 2021 | |
autodesk | autocad_advance_steel | 2022 | |
autodesk | autocad_advance_steel | 2023 | |
autodesk | autocad_architecture | 2019 | |
autodesk | autocad_architecture | 2020 | |
autodesk | autocad_architecture | 2021 | |
autodesk | autocad_architecture | 2022 | |
autodesk | autocad_architecture | 2023 | |
autodesk | autocad_civil_3d | 2019 | |
autodesk | autocad_civil_3d | 2020 | |
autodesk | autocad_civil_3d | 2021 | |
autodesk | autocad_civil_3d | 2022 | |
autodesk | autocad_civil_3d | 2023 | |
autodesk | autocad_electrical | 2019 | |
autodesk | autocad_electrical | 2020 | |
autodesk | autocad_electrical | 2021 | |
autodesk | autocad_electrical | 2022 | |
autodesk | autocad_electrical | 2023 | |
autodesk | autocad_lt | 2019 | |
autodesk | autocad_lt | 2020 | |
autodesk | autocad_lt | 2021 | |
autodesk | autocad_lt | 2022 | |
autodesk | autocad_lt | 2022 | |
autodesk | autocad_lt | 2023 | |
autodesk | autocad_map_3d | 2019 | |
autodesk | autocad_map_3d | 2020 | |
autodesk | autocad_map_3d | 2021 | |
autodesk | autocad_map_3d | 2022 | |
autodesk | autocad_map_3d | 2023 | |
autodesk | autocad_mechanical | 2019 | |
autodesk | autocad_mechanical | 2020 | |
autodesk | autocad_mechanical | 2021 | |
autodesk | autocad_mechanical | 2022 | |
autodesk | autocad_mechanical | 2023 | |
autodesk | autocad_mep | 2019 | |
autodesk | autocad_mep | 2020 | |
autodesk | autocad_mep | 2021 | |
autodesk | autocad_mep | 2022 | |
autodesk | autocad_mep | 2023 | |
autodesk | autocad_plant_3d | 2019 | |
autodesk | autocad_plant_3d | 2020 | |
autodesk | autocad_plant_3d | 2021 | |
autodesk | autocad_plant_3d | 2022 | |
autodesk | autocad_plant_3d | 2023 | |
autodesk | design_review | 2018 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autodesk:autocad:2019:*:*:*:*:*:*:*", "matchCriteriaId": "411DC826-735A-4BEB-84BE-9250F97F612E", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2020:*:*:*:*:*:*:*", "matchCriteriaId": "E30E2562-D38E-4764-874E-5B2FCF5639E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2021:*:*:*:*:*:*:*", "matchCriteriaId": "88B2C295-D091-4C1D-8285-4309967707BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2022:*:*:*:*:*:*:*", "matchCriteriaId": "EACE09F2-A323-4E4B-9A35-4EBAE3864E6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2022:*:*:*:*:macos:*:*", "matchCriteriaId": "68FC54D1-B4FC-404E-9742-72F8340FE3C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad:2023:*:*:*:*:*:*:*", "matchCriteriaId": "2241C287-9396-4AD8-B93C-3596394AB2D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:2019:*:*:*:*:*:*:*", "matchCriteriaId": "9B1CAD53-7C63-4E5D-BD2E-364A7A87AA1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:2020:*:*:*:*:*:*:*", "matchCriteriaId": "127F5A79-8E66-4ABD-8D88-8891C6D670D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:2021:*:*:*:*:*:*:*", "matchCriteriaId": "37D8982C-E506-4988-AA97-BDF1B1C3D71A", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:2022:*:*:*:*:*:*:*", "matchCriteriaId": "002AC200-6AE2-4817-91D3-957DA3AC9787", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_advance_steel:2023:*:*:*:*:*:*:*", "matchCriteriaId": "E881C720-E487-463E-A364-A1F9EC3C1D24", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2019:*:*:*:*:*:*:*", "matchCriteriaId": "9275E76C-2A79-462A-A9D3-D0B6BBCDD0CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2020:*:*:*:*:*:*:*", "matchCriteriaId": "B7DFA12E-48C5-47B9-BD9F-1AFACBF4E1EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2021:*:*:*:*:*:*:*", "matchCriteriaId": "535A5D39-1C82-4301-9E5B-C9E0D75F38B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2022:*:*:*:*:*:*:*", "matchCriteriaId": "316615EC-BC9F-4B6A-8163-EBECC480EFDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_architecture:2023:*:*:*:*:*:*:*", "matchCriteriaId": "546AFB2D-F78A-40C2-AC55-7D07EF0BDC7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2019:*:*:*:*:*:*:*", "matchCriteriaId": "AB3A878B-2142-404F-BCF4-BB508674C6C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2020:*:*:*:*:*:*:*", "matchCriteriaId": "64F2EC88-168D-4DD1-9ADA-3F9FA60D6E35", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2021:*:*:*:*:*:*:*", "matchCriteriaId": "5D73C803-7567-4C1D-B62A-C3C52369022D", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2022:*:*:*:*:*:*:*", "matchCriteriaId": "C5F77B03-3221-4564-B4FF-7BF7EEC1C5B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_civil_3d:2023:*:*:*:*:*:*:*", "matchCriteriaId": "C6E001C0-0D7B-44ED-BBE8-E6635C45F988", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2019:*:*:*:*:*:*:*", "matchCriteriaId": "A10DE5AF-1718-4899-9238-CFFDC72D05B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2020:*:*:*:*:*:*:*", "matchCriteriaId": "E388264D-D2D4-4BE4-9097-8F547D73ABE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2021:*:*:*:*:*:*:*", "matchCriteriaId": "16611BAA-C200-4C8B-823F-1AB95F5E1317", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2022:*:*:*:*:*:*:*", "matchCriteriaId": "E2DC5114-48D2-4D85-8E80-B4BCB0FD78F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_electrical:2023:*:*:*:*:*:*:*", "matchCriteriaId": "A2949D87-C1FA-43C3-8F1F-08ED7A64F302", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2019:*:*:*:*:*:*:*", "matchCriteriaId": "03682B7E-1CF1-4456-A51F-A6ADFC177935", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2020:*:*:*:*:*:*:*", "matchCriteriaId": "371C5F60-4959-40C7-93E1-A01510A95115", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2021:*:*:*:*:*:*:*", "matchCriteriaId": "D83FB4C7-B374-4907-8E2B-EEE61C8339E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2022:*:*:*:*:*:*:*", "matchCriteriaId": "601676EC-2EB4-45D0-B1AE-0980CBD68770", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2022:*:*:*:*:macos:*:*", "matchCriteriaId": "4A2EF334-E4E2-40DA-BD51-B74EE1E0ACCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_lt:2023:*:*:*:*:*:*:*", "matchCriteriaId": "99924DDE-3D49-4D37-A361-69B28E7B94A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2019:*:*:*:*:*:*:*", "matchCriteriaId": "04E05510-B21B-4DDD-88D7-CEB8963E1AFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2020:*:*:*:*:*:*:*", "matchCriteriaId": "D4CD010A-FDBC-40F9-95AC-0CD8388B85D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2021:*:*:*:*:*:*:*", "matchCriteriaId": "FC99E0F3-AA11-4390-A7C0-5BBFCDA94E3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2022:*:*:*:*:*:*:*", "matchCriteriaId": "33AA60CF-611C-45FC-92F8-7517D87B1645", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_map_3d:2023:*:*:*:*:*:*:*", "matchCriteriaId": "15A36E1F-964C-4DF2-91D1-D37ECEFC1C86", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2019:*:*:*:*:*:*:*", "matchCriteriaId": "19255CEC-6161-4D44-B87E-52E86DF4FBA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2020:*:*:*:*:*:*:*", "matchCriteriaId": "7147F378-DFB0-48A8-8B05-8777E1CC7F90", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2021:*:*:*:*:*:*:*", "matchCriteriaId": "3B5C858C-4A01-4916-BE3E-B9056D67CF5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2022:*:*:*:*:*:*:*", "matchCriteriaId": "7EB83A4A-D4C2-4509-BD49-15B9BBC7BF97", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mechanical:2023:*:*:*:*:*:*:*", "matchCriteriaId": "DCF7910A-432F-419E-96E0-25D638A6F298", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2019:*:*:*:*:*:*:*", "matchCriteriaId": "3F608B1C-BA96-4EA8-A540-83870262CBC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2020:*:*:*:*:*:*:*", "matchCriteriaId": "7CFAAD19-6248-42CB-B177-EC2E5141A953", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2021:*:*:*:*:*:*:*", "matchCriteriaId": "1C52D90B-578B-4281-BF0E-B7CDA425ED05", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2022:*:*:*:*:*:*:*", "matchCriteriaId": "4C8AD4F3-AA82-49F5-A18A-85127FDB8B95", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_mep:2023:*:*:*:*:*:*:*", "matchCriteriaId": "DF8D9BA5-A043-42DB-A524-6728D3BF2B90", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2019:*:*:*:*:*:*:*", "matchCriteriaId": "4E536B0D-4C95-4589-981A-2F8A6C4B44DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2020:*:*:*:*:*:*:*", "matchCriteriaId": "3FBDD3AC-FA00-462F-AA13-5A75B5D50689", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2021:*:*:*:*:*:*:*", "matchCriteriaId": "73E2E9E8-2269-4729-8D8F-3C26974F5FD2", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2022:*:*:*:*:*:*:*", "matchCriteriaId": "452A1A75-C59A-43AB-9C43-BA49EB95C39C", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:autocad_plant_3d:2023:*:*:*:*:*:*:*", "matchCriteriaId": "07CB7F37-E6D4-40F3-85BA-EC060E923505", "vulnerable": true }, { "criteria": "cpe:2.3:a:autodesk:design_review:2018:-:*:*:*:*:*:*", "matchCriteriaId": "213232B9-A40B-436D-A66A-B65C49D59BE6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A malicious crafted .dwf or .pct file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process." }, { "lang": "es", "value": "Un archivo .dwf o .pct dise\u00f1ado de forma maliciosa cuando es consumido mediante la aplicaci\u00f3n DesignReview.exe podr\u00eda conllevar a una vulnerabilidad de corrupci\u00f3n de memoria por violaci\u00f3n de acceso de escritura. Esta vulnerabilidad, junto con otras, podr\u00eda conllevar a una ejecuci\u00f3n de c\u00f3digo en el contexto del proceso actual" } ], "id": "CVE-2022-42933", "lastModified": "2024-11-21T07:25:37.360", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-10-21T16:15:11.607", "references": [ { "source": "psirt@autodesk.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004" } ], "sourceIdentifier": "psirt@autodesk.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }