A malicious crafted Dwg2Spd file when processed through Autodesk DWG application could lead to memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
References
Link | Resource |
---|---|
https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0020 | Vendor Advisory |
https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0020 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:08
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0020 - Vendor Advisory |
Information
Published : 2022-10-03 15:15
Updated : 2024-11-21 07:08
NVD link : CVE-2022-33888
Mitre link : CVE-2022-33888
CVE.ORG link : CVE-2022-33888
JSON object : View
Products Affected
autodesk
- autocad_civil_3d
- autocad_advance_steel
- autocad_plant_3d
- autocad_electrical
- autocad_map_3d
- autocad
- autocad_mep
- autocad_architecture
- autocad_mechanical
- autocad_lt
CWE
CWE-787
Out-of-bounds Write