BE-2021-0004: Out-of-bounds and use-after-free vulnerabilities in MicroStation and MicroStation-based applications
Bentley ID: BE-2021-0004
CVE ID: CVE-2021-34874, CVE-2021-34875, CVE-2021-34880, CVE-2021-34889, CVE-2021-34894, CVE-2021-34895, CVE-2021-34901, CVE-2021-34911, CVE-2021-46575, CVE-2021-46586, CVE-2021-46587, CVE-2021-46592, CVE-2021-46595, CVE-2021-46602, CVE-2021-46607, CVE-2021-46623
Severity: 7.8
CVSS v3.1: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Publication date: 2021-12-07
Revision date: 2021-12-07
Summary
MicroStation and MicroStation-based applications may be affected by out-of-bounds and use-after-free vulnerabilities when opening maliciously crafted 3DS files. Exploiting these vulnerabilities could lead to code execution.
Details
The following vulnerabilities related to this advisory were discovered by TrendMicro ZDI : ZDI-CAN-14736, ZDI-CAN-14827, ZDI-CAN-14833, ZDI-CAN-14842, ZDI-CAN-14847, ZDI-CAN-14862, ZDI-CAN-14874, ZDI-CAN-14884, ZDI-CAN-15369, ZDI-CAN-15380, ZDI-CAN-15381, ZDI-CAN-15386, ZDI-CAN-15389, ZDI-CAN-15396, ZDI-CAN-15401, ZDI-CAN-15453. Using an affected version of MicroStation or MicroStation-based application to open a 3DS file containing maliciously crafted data can force an out-of-bounds or use-after-free vulnerability. Exploitation of these vulnerabilities within the parsing of 3DS files could enable an attacker to execute arbitrary code in the context of the current process.
Affected Versions
Applications | Affected Versions | Mitigated Versions |
MicroStation | Versions prior to 10.16.02.* | 10.16.02.* and more recent |
Bentley View | Versions prior to 10.16.02.* | 10.16.02.* and more recent |
Recommended Mitigations
Bentley recommends updating to the latest versions of MicroStation and MicroStation-based applications. As a general best practice, it is also recommended to only open 3DS files coming from trusted sources.
Acknowledgement
Thanks to Francis Provencher {PRL} for discovering ZDI-CAN-14736. Thanks to Mat Powell of Trend Micro Zero Day Initiative for discovering the rest of the vulnerabilities related to this advisory
Revision History
Date | Description |
2021-12-07 | First version of this advisory |
2022-02-04 | Added new CVE numbers provided by ZDI |