A maliciously crafted TGA file, when linked or imported into Autodesk 3ds Max, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.
References
Link | Resource |
---|---|
https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0016 | Vendor Advisory |
Configurations
History
13 Aug 2025, 15:04
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0016 - Vendor Advisory | |
First Time |
Autodesk
Autodesk 3ds Max |
|
CPE | cpe:2.3:a:autodesk:3ds_max:*:*:*:*:*:*:*:* |
07 Aug 2025, 21:26
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
06 Aug 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-06 21:15
Updated : 2025-08-13 15:04
NVD link : CVE-2025-6634
Mitre link : CVE-2025-6634
CVE.ORG link : CVE-2025-6634
JSON object : View
Products Affected
autodesk
- 3ds_max
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')