autocad, autodesk, CAD

Autodesk Design Review DWF Viewer Vulnerability

September 30, 2008

Secunia is reporting a vulnerability with Autodesk’s Design Review DWF Viewer which can lead to a compromised PC.

The vulnerability stems from a flaw in the ActiveX control including the insecure “SaveAs()” method. If exploited, arbitrary files on the compromised computer can be overwritten.

This vulnerability was originally discovered by “bruiser” from Nine Situations Group and outlined here.  Bruiser tested the vulnerability using Internet Explorer 6 along with Revit Architecture 2009 SP2 and Autodesk Design Review 2009.

DWF is a very popular file format for quickly and easily sending drawing files through email, among other things.  Many CAD users prefer DWF because of its vector based capabilities, small file size and the ability for people to view drawing files without having AutoCad installed.  I previously posted on the benefits of DWF for CAD users.

designer

CCT

Are You Ready?

When you are ready to get more specific information about your project, click here and fill out our handy online form for a free web design quote.

Get My Free Quote

you need a website?
we can help

    order a project

    arrow

    Recent Posts

    In Web Design

    Domain Name Services fake letter.

    autocad, autodesk, CAD

    Domain Name Services Scam - Kind of

    Sep 30, 2008

    Secunia is reporting a vulnerability with Autodesk’s Design Review DWF Viewer which can lead to a compromised PC. The vulnerability stems from a...

    Captivating Website Design - Morehead City NC

    autocad, autodesk, CAD

    Web Design Basics

    Sep 30, 2008

    Secunia is reporting a vulnerability with Autodesk’s Design Review DWF Viewer which can lead to a compromised PC. The vulnerability stems from a...

    Dynamic Web Design in Morehead City NC

    autocad, autodesk, CAD

    Three Common Web Design Mistakes

    Sep 30, 2008

    Secunia is reporting a vulnerability with Autodesk’s Design Review DWF Viewer which can lead to a compromised PC. The vulnerability stems from a...

    arrow

    Go to our blog