First published: Fri Sep 07 2012(Updated: )
Multiple untrusted search path vulnerabilities in Autodesk Design Review 2011 11.0.0.86 allow local users to gain privileges via a Trojan horse (1) dwmapi.dll, (2) whiptk_wt.7.12.601.dll, or (3) xaml_wt.7.6.0.dll file in the current working directory, as demonstrated by a directory that contains a .dwf file. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Autodesk Design Review | =11.0.0.86 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-5226 is classified as a medium severity vulnerability due to its potential for local privilege escalation.
To mitigate CVE-2010-5226, ensure that the Autodesk Design Review 2011 application is updated to the latest version and that untrusted DLL files are not placed in the program's working directory.
CVE-2010-5226 affects local users of Autodesk Design Review 2011 version 11.0.0.86.
The exploitation of CVE-2010-5226 involves the placement of malicious dwmapi.dll, whiptk_wt.7.12.601.dll, or xaml_wt.7.6.0.dll files in the current working directory.
CVE-2010-5226 cannot be exploited remotely as it requires local access to the system to place the malicious DLL files.