CVE-2008-4472

The UpdateEngine class in the LiveUpdate ActiveX control (LiveUpdate16.DLL 17.2.56), as used in Revit Architecture 2009 SP2 and Autodesk Design Review 2009, allows remote attackers to execute arbitrary programs via the second argument to the ApplyPatch method.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:autodesk:design_review:2009:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:dwf_viewer:*:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:revit_architecture:2009:sp2:*:*:*:*:*:*

History

21 Nov 2024, 00:51

Type Values Removed Values Added
References () http://images.autodesk.com/adsk/files/live_update_hotfix0.html - () http://images.autodesk.com/adsk/files/live_update_hotfix0.html -
References () http://retrogod.altervista.org/9sg_autodesk_revit_arch_2009_exploit.html - () http://retrogod.altervista.org/9sg_autodesk_revit_arch_2009_exploit.html -
References () http://securityreason.com/securityalert/4361 - () http://securityreason.com/securityalert/4361 -
References () http://usa.autodesk.com/adsk/servlet/ps/dl/item?siteID=123112&id=12452198&linkID=11705366 - () http://usa.autodesk.com/adsk/servlet/ps/dl/item?siteID=123112&id=12452198&linkID=11705366 -
References () http://www.securityfocus.com/archive/1/496847/100/0/threaded - () http://www.securityfocus.com/archive/1/496847/100/0/threaded -
References () http://www.securityfocus.com/bid/31490 - () http://www.securityfocus.com/bid/31490 -
References () http://www.vupen.com/english/advisories/2008/2704 - () http://www.vupen.com/english/advisories/2008/2704 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/45521 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/45521 -
References () https://www.exploit-db.com/exploits/6630 - () https://www.exploit-db.com/exploits/6630 -

Information

Published : 2008-10-07 20:00

Updated : 2024-11-21 00:51


NVD link : CVE-2008-4472

Mitre link : CVE-2008-4472

CVE.ORG link : CVE-2008-4472


JSON object : View

Products Affected

autodesk

  • revit_architecture
  • dwf_viewer
  • design_review
CWE
CWE-264

Permissions, Privileges, and Access Controls