Описание
A maliciously crafted TGA or PCX file may be used to write beyond the allocated buffer through DesignReview.exe application while parsing TGA and PCX files. This vulnerability may be exploited to execute arbitrary code.
Ссылки
- PatchVendor Advisory
- PatchVendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:autodesk:design_review:2011:-:*:*:*:*:*:*
cpe:2.3:a:autodesk:design_review:2012:-:*:*:*:*:*:*
cpe:2.3:a:autodesk:design_review:2013:-:*:*:*:*:*:*
cpe:2.3:a:autodesk:design_review:2017:-:*:*:*:*:*:*
cpe:2.3:a:autodesk:design_review:2018:-:*:*:*:*:*:*
cpe:2.3:a:autodesk:design_review:2018:hotfix:*:*:*:*:*:*
cpe:2.3:a:autodesk:design_review:2018:hotfix2:*:*:*:*:*:*
cpe:2.3:a:autodesk:design_review:2018:hotfix3:*:*:*:*:*:*
cpe:2.3:a:autodesk:design_review:2018:hotfix4:*:*:*:*:*:*
cpe:2.3:a:autodesk:design_review:2018:hotfix5:*:*:*:*:*:*
EPSS
Процентиль: 18%
0.00059
Низкий
7.8 High
CVSS3
Дефекты
CWE-787
Связанные уязвимости
CVSS3: 7.8
github
больше 3 лет назад
A maliciously crafted TGA or PCX file may be used to write beyond the allocated buffer through DesignReview.exe application while parsing TGA and PCX files. This vulnerability may be exploited to execute arbitrary code.
EPSS
Процентиль: 18%
0.00059
Низкий
7.8 High
CVSS3
Дефекты
CWE-787