Vulnerability CVE-2008-4472


Published: 2008-10-07   Modified: 2012-02-13

Description:
The UpdateEngine class in the LiveUpdate ActiveX control (LiveUpdate16.DLL 17.2.56), as used in Revit Architecture 2009 SP2 and Autodesk Design Review 2009, allows remote attackers to execute arbitrary programs via the second argument to the ApplyPatch method.

See advisories in our WLB2 database:
Topic
Author
Date
High
Autodesk DWF Viewer Control / LiveUpdate Module remote code execution exploit
ipsdix_at_gmail....
02.10.2008

Type:

CWE-264

(Permissions, Privileges, and Access Controls)

CVSS2 => (AV:N/AC:M/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
9.3/10
10/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Autodesk -> Design review 
Autodesk -> Dwf viewer 
Autodesk -> Revit architecture 

 References:
http://images.autodesk.com/adsk/files/live_update_hotfix0.html
http://retrogod.altervista.org/9sg_autodesk_revit_arch_2009_exploit.html
http://securityreason.com/securityalert/4361
http://usa.autodesk.com/adsk/servlet/ps/dl/item?siteID=123112&id=12452198&linkID=11705366
http://www.securityfocus.com/archive/1/496847/100/0/threaded
http://www.securityfocus.com/bid/31490
http://www.vupen.com/english/advisories/2008/2704
https://exchange.xforce.ibmcloud.com/vulnerabilities/45521
https://www.exploit-db.com/exploits/6630

Copyright 2021, cxsecurity.com

 

Back to Top