CVE-2024-37008
21.08.2024, 10:15
A maliciously crafted DWG file, when parsed in Revit, can force a stack-based buffer overflow. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process.Enginsight
Vendor | Product | Version |
---|---|---|
autodesk | revit_lt | 2024.2.1 ≤ 𝑥 ≤ 2024.2.1 |
autodesk | revit_lt | 2023.1.4 ≤ 𝑥 ≤ 2023.1.4 |
autodesk | revit_lt | 2022.1.6 ≤ 𝑥 ≤ 2022.1.6 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-121 - Stack-based Buffer OverflowA stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
- CWE-787 - Out-of-bounds WriteThe software writes data past the end, or before the beginning, of the intended buffer.