![]() ![]() ![]() This vulnerability may be exploited to execute arbitrary code.ĥ) CVE-2021-27037 - A maliciously crafted PNG, PDF or DWF file in Autodesk Design Review 2018, 2017, 2013, 2012, 2011 can be used to attempt to free an object that has already been freed while parsing them. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.Ĥ) CVE-2021-27036 - A maliciously crafted PCX, PICT, RCL, TIF, BMP, PSD or TIFF file in Autodesk Design Review 2018, 2017, 2013, 2012, 2011 may be used to write beyond the allocated buffer while parsing PCX, PDF, PICT, RCL, BMP, PSD or TIFF files. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.ģ) CVE-2021-27035 - A maliciously crafted TIFF, TIF, PICT, TGA, or DWF files in Autodesk Design Review 2018, 2017, 2013, 2012, 2011 can be forced to read beyond allocated boundaries when parsing the TIFF, PICT, TGA or DWF files. The details of the vulnerabilities are as follows:ġ) CVE-2021-27033 - A Double Free vulnerability allows remote attackers to execute arbitrary code on PDF files within affected installations of Autodesk Design Review 2018, 2017, 2013, 2012, 2011.
0 Comments
Leave a Reply. |