A maliciously crafted STP file in ASMKERN228A.dll when parsed through Autodesk applications can be used to dereference an untrusted pointer. This vulnerability, along with other vulnerabilities, could lead to code execution in the current process.
The product obtains a value from an untrusted source, converts this value to a pointer, and dereferences the resulting pointer.
Link | Tags |
---|---|
https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0002 | vendor advisory |
https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0004 | vendor advisory |