// For flags

CVE-2022-25793

Autodesk 3DS Max ABC File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability

Severity Score

7.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A Stack-based Buffer Overflow Vulnerability in Autodesk 3ds Max 2022, 2021, and 2020 may lead to code execution through the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer when parsing ActionScript Byte Code files. This vulnerability may allow arbitrary code execution on affected installations of Autodesk 3ds Max.

Una vulnerabilidad de desbordamiento del búfer en la región Stack de la memoria en Autodesk 3ds Max versiones 2022, 2021 y 2020, puede conllevar a una ejecución de código mediante la falta de comprobación apropiada de la longitud de los datos suministrados por el usuario antes de copiarlos en un búfer en la región stack de la memoria de longitud fija cuando son analizados archivos de código de bytes de ActionScript. Esta vulnerabilidad puede permitir la ejecución de código arbitrario en las instalaciones afectadas de Autodesk 3ds Max

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Autodesk 3DS Max. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of ABC files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.

*Credits: Tran Van Khang - khangkito (VinCSS)
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-02-22 CVE Reserved
  • 2022-05-26 CVE Published
  • 2024-01-21 EPSS Updated
  • 2024-08-03 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-1284: Improper Validation of Specified Quantity in Input
CAPEC
References (1)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Autodesk
Search vendor "Autodesk"
3ds Max
Search vendor "Autodesk" for product "3ds Max"
>= 2020 < 2020.3.6
Search vendor "Autodesk" for product "3ds Max" and version " >= 2020 < 2020.3.6"
-
Affected
Autodesk
Search vendor "Autodesk"
3ds Max
Search vendor "Autodesk" for product "3ds Max"
>= 2021 < 2021.3.10
Search vendor "Autodesk" for product "3ds Max" and version " >= 2021 < 2021.3.10"
-
Affected
Autodesk
Search vendor "Autodesk"
3ds Max
Search vendor "Autodesk" for product "3ds Max"
>= 2022 <= 2022.3.3
Search vendor "Autodesk" for product "3ds Max" and version " >= 2022 <= 2022.3.3"
-
Affected