CVE-2022-27872
https://notcve.org/view.php?id=CVE-2022-27872
A maliciously crafted PDF file may be used to dereference a pointer for read or write operation while parsing PDF files in Autodesk Navisworks 2022. The vulnerability exists because the application fails to handle a crafted PDF file, which causes an unhandled exception. An attacker can leverage this vulnerability to cause a crash or read sensitive data or execute arbitrary code. Un archivo PDF diseñado de forma maliciosa puede ser usado para derivar un puntero para operaciones de lectura o escritura mientras son analizados archivos PDF en Autodesk Navisworks 2022. La vulnerabilidad se presenta porque la aplicación no puede manejar un archivo PDF diseñado, lo que causa una excepción no manejada. • https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0011 • CWE-755: Improper Handling of Exceptional Conditions •
CVE-2022-27871
https://notcve.org/view.php?id=CVE-2022-27871
Autodesk AutoCAD product suite, Revit, Design Review and Navisworks releases using PDFTron prior to 9.1.17 version may be used to write beyond the allocated buffer while parsing PDF files. This vulnerability may be exploited to execute arbitrary code. Las versiones del paquete de productos AutoCAD, Revit, Design Review y Navisworks que usan PDFTron versiones anteriores a 9.1.17, pueden escribir más allá del búfer asignado mientras analizan los archivos PDF. Esta vulnerabilidad puede ser explotada para ejecutar código arbitrario • https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0011 • CWE-770: Allocation of Resources Without Limits or Throttling •
CVE-2022-27527
https://notcve.org/view.php?id=CVE-2022-27527
A Memory Corruption vulnerability may lead to code execution through maliciously crafted DLL files. It was fixed in PDFTron earlier than 9.0.7 version in Autodesk Navisworks 2022, and 2020. Una vulnerabilidad de corrupción de memoria puede conducir a la ejecución de código a través de archivos DLL maliciosamente diseñados. Se solucionó en PDFTron anterior a la versión 9.0.7 en Autodesk Navisworks 2022, y 2020 • https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0010 • CWE-787: Out-of-bounds Write •
CVE-2022-25792 – Autodesk Navisworks Manage DWF File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2022-25792
A maliciously crafted DXF file in Autodesk AutoCAD 2022, 2021, 2020, 2019 and Autodesk Navisworks 2022 can be used to write beyond the allocated buffer through Buffer overflow vulnerability. This vulnerability can be exploited to execute arbitrary code. Un archivo DXF diseñado de forma maliciosa en Autodesk AutoCAD versiones 2022, 2021, 2020, 2019 y Autodesk Navisworks versión 2022, puede usarse para escribir más allá del búfer asignado mediante Una vulnerabilidad de desbordamiento del búfer. Esta vulnerabilidad puede ser explotada para ejecutar código arbitrario This vulnerability allows remote attackers to execute arbitrary code on affected installations of Autodesk Navisworks Manage. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DWF files. • https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0005 • CWE-787: Out-of-bounds Write •
CVE-2022-25791 – Autodesk Navisworks Manage DWF File Parsing Memory Corruption Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2022-25791
A Memory Corruption vulnerability for DWF and DWFX files in Autodesk AutoCAD 2022, 2021, 2020, 2019 and Autodesk Navisworks 2022 may lead to code execution through maliciously crafted DLL files. Una vulnerabilidad de Corrupción de Memoria para archivos DWF y DWFX en Autodesk AutoCAD versiones 2022, 2021, 2020, 2019 y Autodesk Navisworks versión 2022, puede conllevar a una ejecución de código mediante archivos DLL maliciosamente diseñados This vulnerability allows remote attackers to execute arbitrary code on affected installations of Autodesk Navisworks Manage. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DWF files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. • https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0005 • CWE-787: Out-of-bounds Write •