René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

144 lines
4.8 KiB
JSON

{
"id": "CVE-2022-27526",
"sourceIdentifier": "psirt@autodesk.com",
"published": "2022-04-18T17:15:16.857",
"lastModified": "2022-04-25T16:25:50.867",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A malicious crafted TGA file when consumed through DesignReview.exe application could lead to memory corruption vulnerability. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process."
},
{
"lang": "es",
"value": "Un archivo TGA dise\u00f1ado de forma maliciosa cuando es consumido mediante la aplicaci\u00f3n DesignReview.exe podr\u00eda conllevar a una vulnerabilidad de corrupci\u00f3n de memoria. Esta vulnerabilidad, junto con otras, podr\u00eda conllevar a una ejecuci\u00f3n de c\u00f3digo en el contexto del proceso actual"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:autodesk:design_review:2011:*:*:*:*:*:*:*",
"matchCriteriaId": "83CF6CDF-806C-4DC5-B572-C1C2BC2C25F2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:autodesk:design_review:2012:*:*:*:*:*:*:*",
"matchCriteriaId": "2A78B6F8-DF84-4E6C-A247-0F6D2F8CA679"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:autodesk:design_review:2013:*:*:*:*:*:*:*",
"matchCriteriaId": "DCD2CA9B-16E1-4BE7-A4E1-A9817A503958"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:autodesk:design_review:2017:*:*:*:*:*:*:*",
"matchCriteriaId": "31F2529F-ECF0-4568-BBDC-82B396A52332"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:autodesk:design_review:2018:-:*:*:*:*:*:*",
"matchCriteriaId": "213232B9-A40B-436D-A66A-B65C49D59BE6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix:*:*:*:*:*:*",
"matchCriteriaId": "2D0CF4DC-ACA5-41D0-B28E-CEB5D2C96F71"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix2:*:*:*:*:*:*",
"matchCriteriaId": "84ED1789-A17F-48F7-A152-09D2A5C59254"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix3:*:*:*:*:*:*",
"matchCriteriaId": "74819924-EB63-4BBF-9986-FEF6100EEE15"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:autodesk:design_review:2018:hotfix4:*:*:*:*:*:*",
"matchCriteriaId": "100922EF-C773-4798-B352-B16FCAD48F36"
}
]
}
]
}
],
"references": [
{
"url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004",
"source": "psirt@autodesk.com",
"tags": [
"Vendor Advisory"
]
}
]
}