cvelist/2021/27xxx/CVE-2021-27036.json

62 lines
1.9 KiB
JSON
Raw Normal View History

2021-02-09 23:00:59 +00:00
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-27036",
2021-07-09 15:00:52 +00:00
"ASSIGNER": "psirt@autodesk.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Autodesk Design Review",
"version": {
"version_data": [
{
"version_value": "2018,\u00a02017,\u00a02013, 2012, 2011"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
2022-04-18 17:01:38 +00:00
"value": "Out-of-bounds Write"
2021-07-09 15:00:52 +00:00
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
2022-04-18 17:01:38 +00:00
"name": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004",
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004"
2021-07-09 15:00:52 +00:00
}
]
2021-02-09 23:00:59 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2022-04-18 17:01:38 +00:00
"value": "A maliciously crafted PCX, PICT, RCL, TIF, BMP, PSD or TIFF file can be used to write beyond the allocated buffer while parsing PCX, PDF, PICT, RCL, BMP, PSD or TIFF files. This vulnerability can be exploited to execute arbitrary code"
2021-02-09 23:00:59 +00:00
}
]
}
}