![]() Specifically, the vulnerability is caused by a malformed DWF file, which causes an out-of-bounds memory write due to an improper bounds check.Īttackers can exploit this vulnerability to execute arbitrary code within the context of the application via a crafted DWF file.įortinet released IPS signature for this specific vulnerability to proactively protect our customers. This is a memory corruption vulnerability that exists in the decoding of Design Web Format (DWF) files in AutoDesk Design Review. More information can be found on the related Fortinet Zero Day Advisory pages by clicking the CVE links, below: CVE-2022-27525 ![]() Impact: Multiple Vulnerabilities leading to Arbitrary Code Execution or Information Disclosure.įollowing are some details on these vulnerabilities. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |