7.8
CVE-2021-27037
- EPSS 0.48%
- Veröffentlicht 09.07.2021 15:15:08
- Zuletzt bearbeitet 21.11.2024 05:57:13
- Quelle psirt@autodesk.com
- CVE-Watchlists
- Unerledigt
A maliciously crafted PNG, PDF or DWF file in Autodesk Design Review 2018, 2017, 2013, 2012, 2011 can be used to attempt to free an object that has already been freed while parsing them. This vulnerability may be exploited by remote malicious actors to execute arbitrary code.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Autodesk ≫ Design Review Version2011
Autodesk ≫ Design Review Version2012
Autodesk ≫ Design Review Version2013
Autodesk ≫ Design Review Version2017
Autodesk ≫ Design Review Version2018 Update-
Autodesk ≫ Design Review Version2018 Updatehotfix
Autodesk ≫ Design Review Version2018 Updatehotfix2
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.48% | 0.644 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 7.8 | 1.8 | 5.9 |
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
|
| nvd@nist.gov | 6.8 | 8.6 | 6.4 |
AV:N/AC:M/Au:N/C:P/I:P/A:P
|
CWE-416 Use After Free
The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer.