CVE-2021-43280

Published: 11/14/2021 21:15:08
A stack-based buffer overflow vulnerability exists in the DWF file reading procedure in Open Design Alliance Drawings SDK before 2022.8. The issue results from the lack of proper validation of the length of user-supplied data before copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.
HIGH
CVSS v3: 7.8

Status

DocFilters Release Package State Justification Comment
25.1 oda (2023.4) Not Affected Code Not Present 2023.4 does not match CVE configuration.
24.4 oda (2023.4) Not Affected Code Not Present 2023.4 does not match CVE configuration.
24.4.0 oda (2023.4) Not Affected Code Not Present 2023.4 does not match CVE configuration.
24.3 oda (2023.4) Not Affected Code Not Present 2023.4 does not match CVE configuration.
24.2.1 oda (2023.4) Not Affected Code Not Present 2023.4 does not match CVE configuration.
24.2 oda (2023.4) Not Affected Code Not Present 2023.4 does not match CVE configuration.
24.1 oda (2023.4) Not Affected Code Not Present 2023.4 does not match CVE configuration.
23.3 oda (2023.4) Not Affected Code Not Present 2023.4 does not match CVE configuration.
23.2.1 oda (2023.4) Not Affected Code Not Present 2023.4 does not match CVE configuration.
23.2 oda (2023.4) Not Affected Code Not Present 2023.4 does not match CVE configuration.
23.1 oda (2023.4) Not Affected Code Not Present 2023.4 does not match CVE configuration.
22.4 oda (2023.4) Not Affected Code Not Present 2023.4 does not match CVE configuration.
22.3 oda (2023.4) Not Affected Code Not Present 2023.4 does not match CVE configuration.

Severity score breakdown

Attack Complexity
LOW
Attack Vector
LOCAL
Availability Impact
HIGH
Base Score
7.8
Base Severity
HIGH
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Privileges Required
NONE
Scope
UNCHANGED
User Interaction
REQUIRED
Vector String
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Version
3.1

References