CVE-2008-4472 – Autodesk DWF Viewer Control / LiveUpdate Module - Remote Code Execution
https://notcve.org/view.php?id=CVE-2008-4472
The UpdateEngine class in the LiveUpdate ActiveX control (LiveUpdate16.DLL 17.2.56), as used in Revit Architecture 2009 SP2 and Autodesk Design Review 2009, allows remote attackers to execute arbitrary programs via the second argument to the ApplyPatch method. La clase UpdateEngine en el control Active X LiveUpdate (LiveUpdate16.DLL 17.2.56), utilizado en Revit Architecture 2009 SP2 y Autodesk Design Review 2009, que permite a los atacantes remotos ejecutar arbitrariamente programas a través del segundo argumento del método ApplyPatch. • https://www.exploit-db.com/exploits/6630 http://images.autodesk.com/adsk/files/live_update_hotfix0.html http://retrogod.altervista.org/9sg_autodesk_revit_arch_2009_exploit.html http://securityreason.com/securityalert/4361 http://usa.autodesk.com/adsk/servlet/ps/dl/item?siteID=123112&id=12452198&linkID=11705366 http://www.securityfocus.com/archive/1/496847/100/0/threaded http://www.securityfocus.com/bid/31490 http://www.vupen.com/english/advisories/2008/2704 https://exchange.xforce. • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2008-4471 – Autodesk DWF Viewer Control / LiveUpdate Module - Remote Code Execution
https://notcve.org/view.php?id=CVE-2008-4471
Directory traversal vulnerability in the CExpressViewerControl class in the DWF Viewer ActiveX control (AdView.dll 9.0.0.96), as used in Revit Architecture 2009 SP2 and Autodesk Design Review 2009, allows remote attackers to overwrite arbitrary files via "..\" sequences in the argument to the SaveAS method. Vulnerabilidad de salto de directorio en la clase CExpressViewerControl en el control ActiveX DWF Viewer (AdView.dll 9.0.0.96), utilizado en Revit Architecture 2009 SP2 y Autodesk Design Review 2009, que permite a los atacante remotos sobrescribir arbitrariamente archivos a través de secuencias "..\" en el argumento to del método SaveAs. • https://www.exploit-db.com/exploits/6630 http://retrogod.altervista.org/9sg_autodesk_revit_arch_2009_exploit.html http://secunia.com/advisories/31989 http://securityreason.com/securityalert/4361 http://www.securityfocus.com/archive/1/496847/100/0/threaded http://www.securityfocus.com/bid/31487 http://www.vupen.com/english/advisories/2008/2704 https://exchange.xforce.ibmcloud.com/vulnerabilities/45519 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •