CVE-2021-43280
Summary
| CVE | CVE-2021-43280 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2021-11-14 21:15:00 UTC |
| Updated | 2021-11-30 20:23:00 UTC |
| Description | A stack-based buffer overflow vulnerability exists in the DWF file reading procedure in Open Design Alliance Drawings SDK before 2022.8. The issue results from the lack of proper validation of the length of user-supplied data before copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. |
Risk And Classification
Problem Types: CWE-787
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Opendesign | Drawings Software Development Kit | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| ZDI-21-1343 | Zero Day Initiative | MISC | www.zerodayinitiative.com | |
| ZDI-21-1341 | Zero Day Initiative | MISC | www.zerodayinitiative.com | |
| www.opendesign.com/security-advisories | MISC | www.opendesign.com | |
| ZDI-21-1356 | Zero Day Initiative | MISC | www.zerodayinitiative.com | |
| ZDI-21-1345 | Zero Day Initiative | MISC | www.zerodayinitiative.com | |
| ZDI-21-1355 | Zero Day Initiative | MISC | www.zerodayinitiative.com | |
| ZDI-21-1342 | Zero Day Initiative | MISC | www.zerodayinitiative.com | |
| ZDI-21-1340 | Zero Day Initiative | MISC | www.zerodayinitiative.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.