A maliciously crafted TIFF, PICT, TGA, or RLC file in Autodesk Image Processing component may be used to write beyond the allocated buffer while parsing TIFF, PICT, TGA, or RLC files. This vulnerability may be exploited to execute arbitrary code.
References
Link | Resource |
---|---|
https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0011 | Vendor Advisory |
https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0011 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:23
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0011 - Vendor Advisory |
Information
Published : 2022-10-07 18:15
Updated : 2024-11-21 06:23
NVD link : CVE-2021-40165
Mitre link : CVE-2021-40165
CVE.ORG link : CVE-2021-40165
JSON object : View
Products Affected
autodesk
- infraworks
- infrastructure_parts_editor
- autocad_lt
- autocad_civil_3d
- autocad_electrical
- autocad_map_3d
- autocad_mep
- revit
- autocad_architecture
- navisworks
- autocad_advance_steel
- autocad_plant_3d
- autocad
- design_review
- autocad_mechanical
- dwg_trueview
- storm_and_sanitary_analysis
- inventor
- fusion
CWE
CWE-787
Out-of-bounds Write