Products
Autodesk applications
Source
psirt@autodesk.com
Tags
CVE-2024-37003 details
Published : June 25, 2024, 4:15 a.m.
Last Modified : June 25, 2024, 12:24 p.m.
Last Modified : June 25, 2024, 12:24 p.m.
Description
A maliciously crafted DWG and SLDPRT file, when parsed in opennurbs.dll and ODXSW_DLL.dll through Autodesk applications, can be used to cause a Stack-based Overflow. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.
CVSS Score
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
---|
Weakness
Weakness | Name | Description |
---|---|---|
CWE-121 | Stack-based Buffer Overflow | A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function). |
References
URL | Source |
---|---|
https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0009 | psirt@autodesk.com |
This website uses the NVD API, but is not approved or certified by it.