First published: Wed Aug 10 2022(Updated: )
A Stack-based Buffer Overflow Vulnerability in Autodesk 3ds Max 2022, 2021, and 2020 may lead to code execution through the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer when parsing ActionScript Byte Code files. This vulnerability may allow arbitrary code execution on affected installations of Autodesk 3ds Max.
Credit: psirt@autodesk.com psirt@autodesk.com
Affected Software | Affected Version | How to fix |
---|---|---|
Autodesk 3ds Max | >=2020<2020.3.6 | |
Autodesk 3ds Max | >=2021<2021.3.10 | |
Autodesk 3ds Max | >=2022<=2022.3.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-25793 is a stack-based buffer overflow vulnerability in Autodesk 3ds Max 2022, 2021, and 2020 that may lead to code execution through the lack of proper validation of the length of user-supplied data.
CVE-2022-25793 affects Autodesk 3ds Max versions 2022.3.3 to 2022, 2021.3.10 to 2021, and 2020.3.6 to 2020.
CVE-2022-25793 has a severity rating of 7.8 (high).
CVE-2022-25793 can be exploited by providing user-supplied data with a length that exceeds the bounds of a fixed-length stack-based buffer when parsing ActionScript Byte Code files.
Yes, Autodesk has released security updates to address the vulnerability. It is recommended to update to the latest version of Autodesk 3ds Max.