A maliciously crafted IGS file in tbb.dll when parsed through Autodesk AutoCAD can be used in user-after-free vulnerability. This vulnerability, along with other vulnerabilities, could lead to code execution in the current process.
Type | CWE ID | Description |
---|---|---|
CWE | CWE-416 | CWE-416 Use After Free |
Version | Base score | Base severity | Vector |
---|---|---|---|
3.1 | 7.8 | HIGH | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
CAPEC ID | Description |
---|---|
CAPEC-100 | CAPEC-100 Overflow Buffers |
Event | Date |
---|
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0002 | x_transferred |
https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0004 | x_transferred |
https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0009 | x_transferred |