First published: Sun Nov 14 2021(Updated: )
An Out-of-Bounds Write vulnerability exists when reading a DGN file using Open Design Alliance Drawings SDK before 2022.11. The specific issue exists within the parsing of DGN files. Crafted data in a DGN file and lack of proper validation of input data can trigger a write operation past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Opendesign Drawings Software Development Kit | <2022.11 | |
Open Design Alliance (ODA) ODAViewer | ||
Open Design Alliance (ODA) Drawings Explorer | ||
<2022.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this Open Design Alliance (ODA) vulnerability is CVE-2021-43390.
The severity of CVE-2021-43390 is high with a CVSS score of 7.8.
This vulnerability affects Open Design Alliance (ODA) Drawings Explorer and ODAViewer installations.
An attacker can exploit CVE-2021-43390 by tricking a user into visiting a malicious page or opening a malicious file.
Yes, you can find references and advisories related to CVE-2021-43390 at the following links: [link1](https://www.opendesign.com/security-advisories), [link2](https://www.zerodayinitiative.com/advisories/ZDI-21-1347/), [link3](https://www.zerodayinitiative.com/advisories/ZDI-21-1348/).