First published: Sun Nov 14 2021(Updated: )
An out-of-bounds write vulnerability exists in the U3D file reading procedure in Open Design Alliance PRC SDK before 2022.10. Crafted data in a U3D file can trigger a write past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Opendesign Oda Prc Software Development Kit | <2022.10 | |
Open Design Alliance (ODA) ODAViewer | ||
<2022.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2021-43279.
The severity of CVE-2021-43279 is high with a CVSS score of 7.8.
Open Design Alliance (ODA) ODAViewer versions up to 2022.10 are affected by CVE-2021-43279.
The vulnerability in ODAViewer allows remote attackers to execute arbitrary code by exploiting an out-of-bounds write vulnerability in the U3D file parsing functionality. This can be triggered by visiting a malicious page or opening a malicious file.
Yes, you can find more information about CVE-2021-43279 in the Open Design Alliance (ODA) security advisories and the Zero Day Initiative advisories.