We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-1847

Multiple vulnerabilities exist in file reading procedure in eDrawings from Release SOLIDWORKS 2023 through Release SOLIDWORKS 2024



Description

Heap-based Buffer Overflow, Memory Corruption, Out-Of-Bounds Read, Out-Of-Bounds Write, Stack-based Buffer Overflow, Type Confusion, Uninitialized Variable, Use-After-Free vulnerabilities exist in the file reading procedure in eDrawings from Release SOLIDWORKS 2023 through Release SOLIDWORKS 2024. These vulnerabilities could allow an attacker to execute arbitrary code while opening a specially crafted CATPART, IPT, JT, SAT, STL, STP, X_B or X_T file. NOTE: CVE-2024-3298 and CVE-2024-3299 were SPLIT from this ID.

Reserved 2024-02-23 | Published 2024-02-28 | Updated 2024-09-02 | Assigner 3DS


HIGH: 7.8CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Problem types

CWE-416 Use After Free

CWE-787 Out-of-bounds Write

CWE-125 Out-of-bounds Read

CWE-843 Access of Resource Using Incompatible Type ('Type Confusion')

CWE-908 Use of Uninitialized Resource

CWE-122 Heap-based Buffer Overflow

CWE-457: Use of Uninitialized Variable

Product status

Default status
unaffected

Release SOLIDWORKS 2023 SP0
affected

Release SOLIDWORKS 2024 SP0
affected

Credits

Mat Powell of Trend Micro Zero Day Initiative finder

Francis Provencher {PRL} finder

rgod finder

References

www.3ds.com/vulnerability/advisories

cve.org (CVE-2024-1847)

nvd.nist.gov (CVE-2024-1847)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-1847

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.