First published: Mon Apr 18 2022(Updated: )
A malicious crafted .dwf or .pct file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
Credit: psirt@autodesk.com
Affected Software | Affected Version | How to fix |
---|---|---|
Autodesk Design Review 2011 | =2011 | |
Autodesk Design Review 2011 | =2012 | |
Autodesk Design Review 2011 | =2013 | |
Autodesk Design Review 2011 | =2017 | |
Autodesk Design Review 2011 | =2018 | |
Autodesk Design Review 2011 | =2018-hotfix | |
Autodesk Design Review 2011 | =2018-hotfix2 | |
Autodesk Design Review 2011 | =2018-hotfix3 | |
Autodesk Design Review 2011 | =2018-hotfix4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2022-27525.
The Autodesk Design Review versions 2011, 2012, 2013, 2017, 2018, 2018-Hotfix, 2018-Hotfix2, 2018-Hotfix3, and 2018-Hotfix4 are affected.
The severity rating of this vulnerability is high, with a CVSS score of 7.8.
This vulnerability can be exploited by consuming a maliciously crafted .dwf or .pct file through the DesignReview.exe application, which can lead to memory corruption and code execution.
Autodesk recommends updating to a version of Design Review that is not affected by this vulnerability.