A maliciously crafted TGA or PCX file may be used to write beyond the allocated buffer through DesignReview.exe application while parsing TGA and PCX files. This vulnerability may be exploited to execute arbitrary code.
References
Link | Resource |
---|---|
https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0009 | Patch Vendor Advisory |
https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0009 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:56
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0009 - Patch, Vendor Advisory |
Information
Published : 2022-07-29 20:15
Updated : 2024-11-21 06:56
NVD link : CVE-2022-27865
Mitre link : CVE-2022-27865
CVE.ORG link : CVE-2022-27865
JSON object : View
Products Affected
autodesk
- design_review
CWE
CWE-787
Out-of-bounds Write