CVE-2021-27037 – Autodesk Design Review PNG File Parsing Use-After-Free Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2021-27037
A maliciously crafted PNG, PDF or DWF file in Autodesk Design Review 2018, 2017, 2013, 2012, 2011 can be used to attempt to free an object that has already been freed while parsing them. This vulnerability may be exploited by remote malicious actors to execute arbitrary code. Un archivo PNG, PDF o DWF malintencionado en Autodesk Design Review 2018, 2017, 2013, 2012, 2011 puede ser utilizado para intentar liberar un objeto que ya ha sido liberado mientras los analiza. Esta vulnerabilidad puede ser explotada por actores maliciosos remotos para ejecutar código arbitrario This vulnerability allows remote attackers to execute arbitrary code on affected installations of Autodesk Design Review. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PNG files. • https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004 • CWE-416: Use After Free •
CVE-2021-27036 – Autodesk Design Review PCX File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2021-27036
A maliciously crafted PCX, PICT, RCL, TIF, BMP, PSD or TIFF file can be used to write beyond the allocated buffer while parsing PCX, PDF, PICT, RCL, BMP, PSD or TIFF files. This vulnerability can be exploited to execute arbitrary code Un archivo PCX, PICT, RCL, TIF, BMP, PSD o TIFF malicioso puede utilizarse para escribir más allá del búfer asignado mientras se analizan archivos PCX, PDF, PICT, RCL, BMP, PSD o TIFF. Esta vulnerabilidad puede ser explotada para ejecutar código arbitrario This vulnerability allows remote attackers to execute arbitrary code on affected installations of Autodesk Design Review. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PCX files. Crafted data in a PCX file can trigger a write past the end of an allocated buffer. • https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004 • CWE-787: Out-of-bounds Write •
CVE-2021-27035 – Autodesk Design Review DWF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability
https://notcve.org/view.php?id=CVE-2021-27035
A maliciously crafted TIFF, TIF, PICT, TGA, or DWF files in Autodesk Design Review 2018, 2017, 2013, 2012, 2011 can be forced to read beyond allocated boundaries when parsing the TIFF, PICT, TGA or DWF files. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process. Un archivo TIFF, TIF, PICT, TGA o DWF malintencionado en Autodesk Design Review 2018, 2017, 2013, 2012, 2011 puede ser forzado a leer más allá de los límites asignados al analizar los archivos TIFF, PICT, TGA o DWF. Esta vulnerabilidad en conjunto con otras vulnerabilidades podría llevar a la ejecución de código en el contexto del proceso actual This vulnerability allows remote attackers to disclose sensitive information on affected installations of Autodesk Design Review. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DWF files. • https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004 • CWE-787: Out-of-bounds Write •
CVE-2021-27034 – Autodesk Design Review TGA File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability
https://notcve.org/view.php?id=CVE-2021-27034
A heap-based buffer overflow could occur while parsing PICT, PCX, RCL or TIFF files in Autodesk Design Review 2018, 2017, 2013, 2012, 2011. This vulnerability can be exploited to execute arbitrary code. Podría producirse un desbordamiento del búfer basado en la pila mientras se analizan archivos PICT, PCX, RCL o TIFF en Autodesk Design Review 2018, 2017, 2013, 2012, 2011. Esta vulnerabilidad puede ser explotada para ejecutar código arbitrario. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Autodesk Design Review. • https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0003 https://www.zerodayinitiative.com/advisories/ZDI-21-1125 https://www.zerodayinitiative.com/advisories/ZDI-21-1126 https://www.zerodayinitiative.com/advisories/ZDI-21-1127 https://www.zerodayinitiative.com/advisories/ZDI-21-1128 https://www.zerodayinitiative.com/advisories/ZDI-21-1129 https://www.zerodayinitiative.com/advisories/ZDI-21-1130 https://www.zerodayinitiative.com/advisories/ZDI-21-1131 https://www.zerodayinitiative.com/adviso • CWE-787: Out-of-bounds Write •
CVE-2021-40167 – Autodesk Design Review DWF File Parsing Memory Corruption Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2021-40167
A malicious crafted dwf or .pct file when consumed through DesignReview.exe application could lead to memory corruption vulnerability by read access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process. Un archivo dwf o .pct malicioso, cuando se consume a través de la aplicación DesignReview.exe, podría conducir a una vulnerabilidad de corrupción de memoria por violación de acceso de lectura. Esta vulnerabilidad, junto con otras, podría conducir a la ejecución de código en el contexto del proceso actual This vulnerability allows remote attackers to execute arbitrary code on affected installations of Autodesk Design Review. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DWF files. • https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004 • CWE-125: Out-of-bounds Read •