We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-1847

Multiple vulnerabilities exist in file reading procedure in eDrawings from Release SOLIDWORKS 2023 through Release SOLIDWORKS 2024



Assigner3DS
Reserved2024-02-23
Published2024-02-28
Updated2024-09-02

Description

Heap-based Buffer Overflow, Memory Corruption, Out-Of-Bounds Read, Out-Of-Bounds Write, Stack-based Buffer Overflow, Type Confusion, Uninitialized Variable, Use-After-Free vulnerabilities exist in the file reading procedure in eDrawings from Release SOLIDWORKS 2023 through Release SOLIDWORKS 2024. These vulnerabilities could allow an attacker to execute arbitrary code while opening a specially crafted CATPART, IPT, JT, SAT, STL, STP, X_B or X_T file. NOTE: CVE-2024-3298 and CVE-2024-3299 were SPLIT from this ID.



HIGH: 7.8CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Product status

Default status
unaffected

Release SOLIDWORKS 2023 SP0
affected

Release SOLIDWORKS 2024 SP0
affected

Credits

Mat Powell of Trend Micro Zero Day Initiative finder

Francis Provencher {PRL} finder

rgod finder

References

https://www.3ds.com/vulnerability/advisories

cve.org CVE-2024-1847

nvd.nist.gov CVE-2024-1847

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-1847
Support options

Helpdesk Telegram

Subscribe to our newsletter to learn more about our work.