Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2024-1847

Опубликовано: 28 фев. 2024
Источник: nvd
CVSS3: 7.8
EPSS Низкий

Описание

Heap-based Buffer Overflow, Memory Corruption, Out-Of-Bounds Read, Out-Of-Bounds Write, Stack-based Buffer Overflow, Type Confusion, Uninitialized Variable, Use-After-Free vulnerabilities exist in the file reading procedure in eDrawings from Release SOLIDWORKS 2023 through Release SOLIDWORKS 2024. These vulnerabilities could allow an attacker to execute arbitrary code while opening a specially crafted CATPART, IPT, JT, SAT, STL, STP, X_B or X_T file. NOTE: CVE-2024-3298 and CVE-2024-3299 were SPLIT from this ID.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:3ds:solidworks:*:*:*:*:*:*:*:*
Версия от 2023 (включая) до 2024 (исключая)
cpe:2.3:a:3ds:solidworks:2024:-:*:*:*:*:*:*
cpe:2.3:a:3ds:solidworks:2024:sp1.0:*:*:*:*:*:*

EPSS

Процентиль: 31%
0.00118
Низкий

7.8 High

CVSS3

Дефекты

CWE-122
CWE-416

Связанные уязвимости

CVSS3: 7.8
github
почти 2 года назад

Heap-based Buffer Overflow, Memory Corruption, Out-Of-Bounds Read, Out-Of-Bounds Write, Stack-based Buffer Overflow, Type Confusion, Uninitialized Variable, Use-After-Free vulnerabilities exist in the file reading procedure in eDrawings from Release SOLIDWORKS 2023 through Release SOLIDWORKS 2024. These vulnerabilities could allow an attacker to execute arbitrary code while opening a specially crafted CATPART, DWG, DXF, IPT, JT, SAT, SLDDRW, SLDPRT, STL, STP, X_B or X_T file.

EPSS

Процентиль: 31%
0.00118
Низкий

7.8 High

CVSS3

Дефекты

CWE-122
CWE-416