An Out-of-bounds Read vulnerability exists in the DGN file reading procedure in Open Design Alliance Drawings SDK before 2022.11. Crafted data in a DGN file and lack of verification of input data can trigger a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://www.opendesign.com/security-advisories | vendor advisory |
https://www.zerodayinitiative.com/advisories/ZDI-21-1281/ | third party advisory vdb entry |
https://www.zerodayinitiative.com/advisories/ZDI-21-1291/ | third party advisory vdb entry |
https://www.zerodayinitiative.com/advisories/ZDI-21-1357/ | third party advisory vdb entry |
https://www.zerodayinitiative.com/advisories/ZDI-21-1351/ | third party advisory vdb entry |