Description
Heap-based Buffer Overflow, Memory Corruption, Out-Of-Bounds Read, Out-Of-Bounds Write, Stack-based Buffer Overflow, Type Confusion, Uninitialized Variable, Use-After-Free vulnerabilities exist in the file reading procedure in eDrawings from Release SOLIDWORKS 2023 through Release SOLIDWORKS 2024. These vulnerabilities could allow an attacker to execute arbitrary code while opening a specially crafted CATPART, IPT, JT, SAT, STL, STP, X_B or X_T file. NOTE: CVE-2024-3298 and CVE-2024-3299 were SPLIT from this ID.
Published: 2024-02-28
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-17572 Heap-based Buffer Overflow, Memory Corruption, Out-Of-Bounds Read, Out-Of-Bounds Write, Stack-based Buffer Overflow, Type Confusion, Uninitialized Variable, Use-After-Free vulnerabilities exist in the file reading procedure in eDrawings from Release SOLIDWORKS 2023 through Release SOLIDWORKS 2024. These vulnerabilities could allow an attacker to execute arbitrary code while opening a specially crafted CATPART, IPT, JT, SAT, STL, STP, X_B or X_T file. NOTE: CVE-2024-3298 and CVE-2024-3299 were SPLIT from this ID.
History

Mon, 02 Sep 2024 08:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-122
CWE-457

Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: 3DS

Published:

Updated: 2024-09-02T08:11:23.914Z

Reserved: 2024-02-23T16:39:26.436Z

Link: CVE-2024-1847

cve-icon Vulnrichment

Updated: 2024-08-01T18:56:22.102Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-02-28T18:15:45.687

Modified: 2024-11-21T08:51:26.793

Link: CVE-2024-1847

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.