A user may be tricked into opening a malicious FBX file which may exploit a use-after-free vulnerability in FBX's Review causing the application to reference a memory location controlled by an unauthorized third party, thereby running arbitrary code on the system.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: autodesk

Published: 2021-04-19T15:10:45

Updated: 2024-08-03T20:40:47.069Z

Reserved: 2021-02-09T00:00:00

Link: CVE-2021-27031

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2021-04-19T16:15:13.247

Modified: 2021-09-16T13:21:27.710

Link: CVE-2021-27031

cve-icon Redhat

No data.