Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-ch5j-vx43-x3h2

Опубликовано: 06 дек. 2021
Источник: github
Github: Не прошло ревью

Описание

A use-after-free vulnerability exists when reading a DWF/DWFX file using Open Design Alliance Drawings SDK before 2022.11. The specific issue exists with parsing DWF/DWFX files. Crafted data in a DWF/DWFX file and lack of proper validation of input data can trigger a write operation past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.

A use-after-free vulnerability exists when reading a DWF/DWFX file using Open Design Alliance Drawings SDK before 2022.11. The specific issue exists with parsing DWF/DWFX files. Crafted data in a DWF/DWFX file and lack of proper validation of input data can trigger a write operation past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.

EPSS

Процентиль: 62%
0.00422
Низкий

Дефекты

CWE-416

Связанные уязвимости

CVSS3: 7.8
nvd
около 4 лет назад

A use-after-free vulnerability exists when reading a DWF/DWFX file using Open Design Alliance Drawings SDK before 2022.11. The specific issue exists with parsing DWF/DWFX files. Crafted data in a DWF/DWFX file and lack of proper validation of input data can trigger a write operation past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.

EPSS

Процентиль: 62%
0.00422
Низкий

Дефекты

CWE-416