CVE-2024-7992
29.10.2024, 22:15
A maliciously crafted DWG file, when parsed through Autodesk AutoCAD and certain AutoCAD-based products, can force a Stack-based Buffer Overflow. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.Enginsight
Vendor | Product | Version |
---|---|---|
autodesk | autocad | 2025 ≤ 𝑥 < 2025.1.1 |
autodesk | autocad_advance_steel | 2025 ≤ 𝑥 < 2025.1.1 |
autodesk | autocad_architecture | 2025 ≤ 𝑥 < 2025.1.1 |
autodesk | autocad_civil_3d | 2025 ≤ 𝑥 < 2025.1.1 |
autodesk | autocad_electrical | 2025 ≤ 𝑥 < 2025.1.1 |
autodesk | autocad_lt | 2025 ≤ 𝑥 < 2025.1.1 |
autodesk | autocad_mechanical | 2025 ≤ 𝑥 < 2025.1.1 |
autodesk | autocad_mep | 2025 ≤ 𝑥 < 2025.1.1 |
autodesk | autocad_plant_3d | 2025 ≤ 𝑥 < 2025.1.1 |
autodesk | dwg_trueview | 2025 ≤ 𝑥 < 2025.1.1 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-121 - Stack-based Buffer OverflowA stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
- CWE-787 - Out-of-bounds WriteThe software writes data past the end, or before the beginning, of the intended buffer.