{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2021-40166","assignerOrgId":"7e40ea87-bc65-4944-9723-dd79dd760601","assignerShortName":"autodesk","dateUpdated":"2024-08-04T02:27:31.562Z","dateReserved":"2021-08-27T00:00:00.000Z","datePublished":"2022-10-07T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"7e40ea87-bc65-4944-9723-dd79dd760601","shortName":"autodesk","dateUpdated":"2022-10-07T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"A maliciously crafted PNG file in Autodesk Image Processing component may be used to attempt to free an object that has already been freed while parsing them. This vulnerability may be exploited by attackers to execute arbitrary code."}],"affected":[{"vendor":"n/a","product":"Revit, Inventor, Infraworks, Navisworks, Fusion, Infrastructure Parts Editors, Autodesk Advanced Steel, Civil 3D, AutoCAD, AutoCAD LT, AutoCAD Architecture, AutoCAD Electrical, AutoCAD Map 3D, AutoCAD Mechanical, AutoCAD MEP, AutoCAD Plant 3D","versions":[{"version":"2022, 2021, 2020, 2019","status":"affected"}]}],"references":[{"url":"https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0011"}],"problemTypes":[{"descriptions":[{"type":"text","lang":"en","description":"Use-After-Free"}]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T02:27:31.562Z"},"title":"CVE Program Container","references":[{"url":"https://www.autodesk.com/trust/security-advisories/adsk-sa-2021-0011","tags":["x_transferred"]}]}]}}