Lucene search

K
kasperskyKaspersky LabKLA10725
HistoryOct 28, 2015 - 12:00 a.m.

KLA10725 Code execution vulnerabilities in Aurodesk Design Review

2015-10-2800:00:00
Kaspersky Lab
threats.kaspersky.com
28

7.9 High

AI Score

Confidence

Low

6.8 Medium

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.111 Low

EPSS

Percentile

95.2%

Multiple serious vulnerabilities have been found in Autodesk Design Review. Malicious users can exploit these vulnerabilities to execute arbitrary code.

Below is a complete list of vulnerabilities

  1. Integer overflow can be exploited remotely via a specially designed BMP file;
  2. Buffer overflows can be exploited remotely via a specially designed BMP, FLI, PCX or GIF files.

Technical details

Vulnerability (1) can be triggered via biClrUsed value.

Vulnerability (2) can be triggered via RLE data in BMP or FLI files, encoded scan lines in PCX file or DataSubBlock or GlobalColorTable in GIF file.

Original advisories

Autodesk hotfix note

Related products

Autodesk-Design-Review

CVE list

CVE-2015-8571 high

CVE-2015-8572 high

Solution

If you use older version you must update to 2013 and install hotfix. If you already use 2013 version – install hotfixAutodesk Design Review hotfix

Autodesk Design Review 2013

Impacts

  • ACE

Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.

Affected Products

  • Autodesk Design Review versions earlier than 2013 with hotfix 2

7.9 High

AI Score

Confidence

Low

6.8 Medium

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.111 Low

EPSS

Percentile

95.2%