CVE-2024-23133

A maliciously crafted STP file in ASMDATAX228A.dll when parsed through Autodesk AutoCAD could lead to a memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
Configurations

No configuration.

History

01 Aug 2024, 13:47

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5

18 Mar 2024, 00:15

Type Values Removed Values Added
Summary (en) A maliciously crafted STP file in ASMDATAX228A.dll when parsed through Autodesk AutoCAD could lead to a memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process. (en) A maliciously crafted STP file in ASMDATAX228A.dll when parsed through Autodesk AutoCAD could lead to a memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.
References
  • () https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0004 -

22 Feb 2024, 19:07

Type Values Removed Values Added
Summary
  • (es) Un archivo STP creado con fines malintencionados en ASMDATAX228A.dll cuando se analiza mediante Autodesk AutoCAD podría provocar una vulnerabilidad de corrupción de memoria por infracción de acceso de escritura. Esta vulnerabilidad, junto con otras vulnerabilidades, podría provocar la ejecución de código en el contexto del proceso actual.

22 Feb 2024, 04:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-22 04:15

Updated : 2024-08-01 13:47


NVD link : CVE-2024-23133

Mitre link : CVE-2024-23133

CVE.ORG link : CVE-2024-23133


JSON object : View

Products Affected

No product.

CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer