A malicious crafted Dwg2Spd file when processed through Autodesk DWG application could lead to memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
References
Link | Resource |
---|---|
https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0020 | Vendor Advisory |
https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0020 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
20 May 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0020 - Vendor Advisory |
Information
Published : 2022-10-03 15:15
Updated : 2025-05-20 15:15
NVD link : CVE-2022-33888
Mitre link : CVE-2022-33888
JSON object : View
Products Affected
autodesk
- autocad_mechanical
- autocad
- autocad_electrical
- autocad_plant_3d
- autocad_mep
- autocad_map_3d
- autocad_advance_steel
- autocad_civil_3d
- autocad_architecture
- autocad_lt
CWE
CWE-787
Out-of-bounds Write