First published: Sun Nov 14 2021(Updated: )
A stack-based buffer overflow vulnerability exists in the DWF file reading procedure in Open Design Alliance Drawings SDK before 2022.8. The issue results from the lack of proper validation of the length of user-supplied data before copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Opendesign Drawings Software Development Kit | <2022.8 | |
Open Design Alliance (ODA) Drawings Explorer | ||
<2022.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-43280.
The severity level of CVE-2021-43280 is high with a CVSS score of 7.8.
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Open Design Alliance (ODA) Drawings Explorer.
Yes, user interaction is required to exploit this vulnerability. The target must visit a malicious page or open a malicious file.
Yes, you can find the references for this vulnerability at the following links: [Link 1](https://www.opendesign.com/security-advisories), [Link 2](https://www.zerodayinitiative.com/advisories/ZDI-21-1340/), [Link 3](https://www.zerodayinitiative.com/advisories/ZDI-21-1341/)