First published: Mon Apr 18 2022(Updated: )
A malicious crafted TGA file when consumed through DesignReview.exe application could lead to memory corruption vulnerability. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
Credit: psirt@autodesk.com
Affected Software | Affected Version | How to fix |
---|---|---|
Autodesk Design Review | =2011 | |
Autodesk Design Review | =2012 | |
Autodesk Design Review | =2013 | |
Autodesk Design Review | =2017 | |
Autodesk Design Review | =2018 | |
Autodesk Design Review | =2018-hotfix | |
Autodesk Design Review | =2018-hotfix2 | |
Autodesk Design Review | =2018-hotfix3 | |
Autodesk Design Review | =2018-hotfix4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2022-27526.
CVE-2022-27526 has a severity rating of 7.8 (high).
DesignReview.exe application versions 2011 to 2018 hotfix4, developed by Autodesk, are affected by CVE-2022-27526.
CVE-2022-27526 can be exploited by consuming a malicious crafted TGA file through the DesignReview.exe application, leading to memory corruption vulnerability.
Yes, code execution in the context of the current process is possible when CVE-2022-27526 is combined with other vulnerabilities.