First published: Fri Jul 29 2022(Updated: )
A maliciously crafted TGA or PCX file may be used to write beyond the allocated buffer through DesignReview.exe application while parsing TGA and PCX files. This vulnerability may be exploited to execute arbitrary code.
Credit: psirt@autodesk.com
Affected Software | Affected Version | How to fix |
---|---|---|
Autodesk Design Review | =2011 | |
Autodesk Design Review | =2012 | |
Autodesk Design Review | =2013 | |
Autodesk Design Review | =2017 | |
Autodesk Design Review | =2018 | |
Autodesk Design Review | =2018-hotfix | |
Autodesk Design Review | =2018-hotfix2 | |
Autodesk Design Review | =2018-hotfix3 | |
Autodesk Design Review | =2018-hotfix4 | |
Autodesk Design Review | =2018-hotfix5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2022-27865.
Autodesk Design Review versions 2011, 2012, 2013, 2017, 2018, 2018-hotfix, 2018-hotfix2, 2018-hotfix3, 2018-hotfix4, and 2018-hotfix5 are affected by this vulnerability.
This vulnerability can be exploited by using a maliciously crafted TGA or PCX file to write beyond the allocated buffer through the DesignReview.exe application while parsing TGA and PCX files.
The severity of this vulnerability is high with a CVSS score of 7.8.
To fix this vulnerability, it is recommended to update Autodesk Design Review to a version that is not affected by this vulnerability.