CVE-2021-27036

A maliciously crafted PCX, PICT, RCL, TIF, BMP, PSD or TIFF file can be used to write beyond the allocated buffer while parsing PCX, PDF, PICT, RCL, BMP, PSD or TIFF files. This vulnerability can be exploited to execute arbitrary code
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:autodesk:design_review:2011:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:design_review:2012:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:design_review:2013:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:design_review:2017:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:design_review:2018:-:*:*:*:*:*:*
cpe:2.3:a:autodesk:design_review:2018:hotfix:*:*:*:*:*:*
cpe:2.3:a:autodesk:design_review:2018:hotfix2:*:*:*:*:*:*
cpe:2.3:a:autodesk:design_review:2018:hotfix3:*:*:*:*:*:*

History

12 May 2022, 16:57

Type Values Removed Values Added
References (MISC) https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004 - (MISC) https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004 - Patch, Vendor Advisory
CPE cpe:2.3:a:autodesk:design_review:2018:*:*:*:*:*:*:* cpe:2.3:a:autodesk:design_review:2018:hotfix:*:*:*:*:*:*
cpe:2.3:a:autodesk:design_review:2018:hotfix3:*:*:*:*:*:*
cpe:2.3:a:autodesk:design_review:2018:hotfix2:*:*:*:*:*:*
cpe:2.3:a:autodesk:design_review:2018:-:*:*:*:*:*:*

18 Apr 2022, 17:15

Type Values Removed Values Added
References
  • {'url': 'https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0003', 'name': 'https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0003', 'tags': ['Vendor Advisory'], 'refsource': 'MISC'}
  • {'url': 'https://www.zerodayinitiative.com/advisories/ZDI-22-482/', 'name': 'https://www.zerodayinitiative.com/advisories/ZDI-22-482/', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://www.zerodayinitiative.com/advisories/ZDI-22-456/', 'name': 'https://www.zerodayinitiative.com/advisories/ZDI-22-456/', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://www.zerodayinitiative.com/advisories/ZDI-21-1138/', 'name': 'https://www.zerodayinitiative.com/advisories/ZDI-21-1138/', 'tags': ['Third Party Advisory', 'VDB Entry'], 'refsource': 'MISC'}
  • {'url': 'https://www.zerodayinitiative.com/advisories/ZDI-22-458/', 'name': 'https://www.zerodayinitiative.com/advisories/ZDI-22-458/', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://www.zerodayinitiative.com/advisories/ZDI-21-1141/', 'name': 'https://www.zerodayinitiative.com/advisories/ZDI-21-1141/', 'tags': ['Third Party Advisory', 'VDB Entry'], 'refsource': 'MISC'}
  • {'url': 'https://www.zerodayinitiative.com/advisories/ZDI-22-462/', 'name': 'https://www.zerodayinitiative.com/advisories/ZDI-22-462/', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://www.zerodayinitiative.com/advisories/ZDI-21-1143/', 'name': 'https://www.zerodayinitiative.com/advisories/ZDI-21-1143/', 'tags': ['Third Party Advisory', 'VDB Entry'], 'refsource': 'MISC'}
  • {'url': 'https://www.zerodayinitiative.com/advisories/ZDI-21-1142/', 'name': 'https://www.zerodayinitiative.com/advisories/ZDI-21-1142/', 'tags': ['Third Party Advisory', 'VDB Entry'], 'refsource': 'MISC'}
  • {'url': 'https://www.zerodayinitiative.com/advisories/ZDI-22-457/', 'name': 'https://www.zerodayinitiative.com/advisories/ZDI-22-457/', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://www.zerodayinitiative.com/advisories/ZDI-22-479/', 'name': 'https://www.zerodayinitiative.com/advisories/ZDI-22-479/', 'tags': [], 'refsource': 'MISC'}
  • (MISC) https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004 -
Summary A maliciously crafted PCX, PICT, RCL or TIFF file in Autodesk Design Review 2018, 2017, 2013, 2012, 2011 can be used to write beyond the allocated buffer while parsing PCX, PDF, PICT, RCL or TIFF files. This vulnerability can be exploited to execute arbitrary code. A maliciously crafted PCX, PICT, RCL, TIF, BMP, PSD or TIFF file can be used to write beyond the allocated buffer while parsing PCX, PDF, PICT, RCL, BMP, PSD or TIFF files. This vulnerability can be exploited to execute arbitrary code

10 Mar 2022, 17:42

Type Values Removed Values Added
References
  • (MISC) https://www.zerodayinitiative.com/advisories/ZDI-22-482/ -
  • (MISC) https://www.zerodayinitiative.com/advisories/ZDI-22-456/ -
  • (MISC) https://www.zerodayinitiative.com/advisories/ZDI-22-458/ -
  • (MISC) https://www.zerodayinitiative.com/advisories/ZDI-22-462/ -
  • (MISC) https://www.zerodayinitiative.com/advisories/ZDI-22-457/ -
  • (MISC) https://www.zerodayinitiative.com/advisories/ZDI-22-479/ -

06 Dec 2021, 21:34

Type Values Removed Values Added
References (MISC) https://www.zerodayinitiative.com/advisories/ZDI-21-1141/ - (MISC) https://www.zerodayinitiative.com/advisories/ZDI-21-1141/ - Third Party Advisory, VDB Entry
References (MISC) https://www.zerodayinitiative.com/advisories/ZDI-21-1143/ - (MISC) https://www.zerodayinitiative.com/advisories/ZDI-21-1143/ - Third Party Advisory, VDB Entry
References (MISC) https://www.zerodayinitiative.com/advisories/ZDI-21-1138/ - (MISC) https://www.zerodayinitiative.com/advisories/ZDI-21-1138/ - Third Party Advisory, VDB Entry
References (MISC) https://www.zerodayinitiative.com/advisories/ZDI-21-1142/ - (MISC) https://www.zerodayinitiative.com/advisories/ZDI-21-1142/ - Third Party Advisory, VDB Entry

17 Nov 2021, 22:17

Type Values Removed Values Added
Summary A maliciously crafted PDF, PICT or TIFF file can be used to write beyond the allocated buffer while parsing PDF, PICT or TIFF files in Autodesk 2018, 2017, 2013, 2012, 2011. This vulnerability can be exploited to execute arbitrary code. A maliciously crafted PCX, PICT, RCL or TIFF file in Autodesk Design Review 2018, 2017, 2013, 2012, 2011 can be used to write beyond the allocated buffer while parsing PCX, PDF, PICT, RCL or TIFF files. This vulnerability can be exploited to execute arbitrary code.

06 Oct 2021, 13:15

Type Values Removed Values Added
References
  • (MISC) https://www.zerodayinitiative.com/advisories/ZDI-21-1141/ -
  • (MISC) https://www.zerodayinitiative.com/advisories/ZDI-21-1138/ -
  • (MISC) https://www.zerodayinitiative.com/advisories/ZDI-21-1142/ -
  • (MISC) https://www.zerodayinitiative.com/advisories/ZDI-21-1143/ -

12 Jul 2021, 16:55

Type Values Removed Values Added
CWE CWE-787
CVSS v2 : unknown
v3 : unknown
v2 : 6.8
v3 : 7.8
References (MISC) https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0003 - (MISC) https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0003 - Vendor Advisory
CPE cpe:2.3:a:autodesk:design_review:2012:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:design_review:2011:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:design_review:2017:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:design_review:2018:*:*:*:*:*:*:*
cpe:2.3:a:autodesk:design_review:2013:*:*:*:*:*:*:*

09 Jul 2021, 15:38

Type Values Removed Values Added
New CVE

Information

Published : 2021-07-09 15:15

Updated : 2024-02-04 21:47


NVD link : CVE-2021-27036

Mitre link : CVE-2021-27036

CVE.ORG link : CVE-2021-27036


JSON object : View

Products Affected

autodesk

  • design_review
CWE
CWE-787

Out-of-bounds Write