Heap-based Buffer Overflow, Memory Corruption, Out-Of...
High severity
Unreviewed
Published
Mar 22, 2024
to the GitHub Advisory Database
•
Updated Sep 2, 2024
Description
Published by the National Vulnerability Database
Mar 22, 2024
Published to the GitHub Advisory Database
Mar 22, 2024
Last updated
Sep 2, 2024
Heap-based Buffer Overflow, Memory Corruption, Out-Of-Bounds Read, Out-Of-Bounds Write, Stack-based Buffer Overflow, Type Confusion, Uninitialized Variable, Use-After-Free vulnerabilities exist in the file reading procedure in SOLIDWORKS Desktop on Release SOLIDWORKS 2024.
These vulnerabilities could allow an attacker to execute arbitrary code while opening a specially crafted CATPART, DWG, DXF, IPT, JT, SAT, SLDDRW, SLDPRT, STL, STP, X_B or X_T file.
References