A maliciously crafted DWG file, when parsed in Revit, can force a stack-based buffer overflow. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.
References
Link | Resource |
---|---|
https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0013 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
23 Aug 2024, 16:57
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0013 - Vendor Advisory | |
CWE | CWE-787 | |
First Time |
Autodesk revit
Autodesk |
|
CPE | cpe:2.3:a:autodesk:revit:2022:*:*:*:*:*:*:* cpe:2.3:a:autodesk:revit:2025:*:*:*:*:*:*:* cpe:2.3:a:autodesk:revit:2024:*:*:*:*:*:*:* cpe:2.3:a:autodesk:revit:2023:*:*:*:*:*:*:* |
21 Aug 2024, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-08-21 10:15
Updated : 2024-08-23 16:57
NVD link : CVE-2024-37008
Mitre link : CVE-2024-37008
CVE.ORG link : CVE-2024-37008
JSON object : View
Products Affected
autodesk
- revit