CVE-2024-1848
- EPSS 0.08%
- Veröffentlicht 22.03.2024 11:15:46
- Zuletzt bearbeitet 21.11.2024 08:51:26
- Quelle 3DS.Information-Security@3ds.c
- Teams Watchlist Login
- Unerledigt Login
Heap-based Buffer Overflow, Memory Corruption, Out-Of-Bounds Read, Out-Of-Bounds Write, Stack-based Buffer Overflow, Type Confusion, Uninitialized Variable, Use-After-Free vulnerabilities exist in the file reading procedure in SOLIDWORKS Desktop on Release SOLIDWORKS 2024. These vulnerabilities could allow an attacker to execute arbitrary code while opening a specially crafted CATPART, DWG, DXF, IPT, JT, SAT, SLDDRW, SLDPRT, STL, STP, X_B or X_T file.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.08% | 0.233 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
3DS.Information-Security@3ds.com | 7.8 | 1.8 | 5.9 |
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
|
A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().
The product reads data past the end, or before the beginning, of the intended buffer.
The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer.
The code uses a variable that has not been initialized, leading to unpredictable or unintended results.
The product writes data past the end, or before the beginning, of the intended buffer.
The product allocates or initializes a resource such as a pointer, object, or variable using one type, but it later accesses that resource using a type that is incompatible with the original type.
The product uses or accesses a resource that has not been initialized.