{ "id": "CVE-2021-27037", "sourceIdentifier": "psirt@autodesk.com", "published": "2021-07-09T15:15:08.190", "lastModified": "2022-05-12T16:38:17.590", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A maliciously crafted PNG, PDF or DWF file in Autodesk Design Review 2018, 2017, 2013, 2012, 2011 can be used to attempt to free an object that has already been freed while parsing them. This vulnerability may be exploited by remote malicious actors to execute arbitrary code." }, { "lang": "es", "value": "Un archivo PNG, PDF o DWF malintencionado en Autodesk Design Review 2018, 2017, 2013, 2012, 2011 puede ser utilizado para intentar liberar un objeto que ya ha sido liberado mientras los analiza. Esta vulnerabilidad puede ser explotada por actores maliciosos remotos para ejecutar c\u00f3digo arbitrario" } ], "metrics": { "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 5.9 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "baseScore": 6.8 }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-416" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:autodesk:design_review:2011:*:*:*:*:*:*:*", "matchCriteriaId": "83CF6CDF-806C-4DC5-B572-C1C2BC2C25F2" }, { "vulnerable": true, "criteria": "cpe:2.3:a:autodesk:design_review:2012:*:*:*:*:*:*:*", "matchCriteriaId": "2A78B6F8-DF84-4E6C-A247-0F6D2F8CA679" }, { "vulnerable": true, "criteria": "cpe:2.3:a:autodesk:design_review:2013:*:*:*:*:*:*:*", "matchCriteriaId": "DCD2CA9B-16E1-4BE7-A4E1-A9817A503958" }, { "vulnerable": true, "criteria": "cpe:2.3:a:autodesk:design_review:2017:*:*:*:*:*:*:*", "matchCriteriaId": "31F2529F-ECF0-4568-BBDC-82B396A52332" }, { "vulnerable": true, "criteria": "cpe:2.3:a:autodesk:design_review:2018:-:*:*:*:*:*:*", "matchCriteriaId": "213232B9-A40B-436D-A66A-B65C49D59BE6" }, { "vulnerable": true, "criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix:*:*:*:*:*:*", "matchCriteriaId": "2D0CF4DC-ACA5-41D0-B28E-CEB5D2C96F71" }, { "vulnerable": true, "criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix2:*:*:*:*:*:*", "matchCriteriaId": "84ED1789-A17F-48F7-A152-09D2A5C59254" } ] } ] } ], "references": [ { "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004", "source": "psirt@autodesk.com", "tags": [ "Vendor Advisory" ] } ] }