7.8
CVE-2022-27526
- EPSS 0.34%
- Veröffentlicht 18.04.2022 17:15:16
- Zuletzt bearbeitet 21.11.2024 06:55:53
- Quelle psirt@autodesk.com
- CVE-Watchlists
- Unerledigt
A malicious crafted TGA file when consumed through DesignReview.exe application could lead to memory corruption vulnerability. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Autodesk ≫ Design Review Version2011
Autodesk ≫ Design Review Version2012
Autodesk ≫ Design Review Version2013
Autodesk ≫ Design Review Version2017
Autodesk ≫ Design Review Version2018 Update-
Autodesk ≫ Design Review Version2018 Updatehotfix
Autodesk ≫ Design Review Version2018 Updatehotfix2
Autodesk ≫ Design Review Version2018 Updatehotfix3
Autodesk ≫ Design Review Version2018 Updatehotfix4
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.34% | 0.563 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 7.8 | 1.8 | 5.9 |
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
|
| nvd@nist.gov | 6.8 | 8.6 | 6.4 |
AV:N/AC:M/Au:N/C:P/I:P/A:P
|
CWE-787 Out-of-bounds Write
The product writes data past the end, or before the beginning, of the intended buffer.