A maliciously crafted 3DM, MODEL and X_B file, when parsed in ASMkern229A.dll and ASMBASE229A.dll through Autodesk applications, can force an Out-of-Bound Read and/or Out-of-Bound Write. A malicious actor can leverage this vulnerability to cause a crash,read sensitive data, or execute arbitrary code in the context of the current process.
Metrics
Affected Vendors & Products
References
History
Tue, 28 Jan 2025 17:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-787 |
Tue, 28 Jan 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Autodesk
Autodesk advance Steel Autodesk autocad Autodesk civil 3d |
|
CPEs | cpe:2.3:a:autodesk:advance_steel:2024:*:*:*:*:*:*:* cpe:2.3:a:autodesk:autocad:2024:*:*:*:*:*:*:* cpe:2.3:a:autodesk:civil_3d:2024:*:*:*:*:*:*:* |
|
Vendors & Products |
Autodesk
Autodesk advance Steel Autodesk autocad Autodesk civil 3d |
|
Metrics |
ssvc
|
Tue, 28 Jan 2025 16:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A maliciously crafted 3DM, MODEL and X_B file, when parsed in ASMkern229A.dll and ASMBASE229A.dll through Autodesk applications, can force an Out-of-Bound Read and/or Out-of-Bound Write. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process. | A maliciously crafted 3DM, MODEL and X_B file, when parsed in ASMkern229A.dll and ASMBASE229A.dll through Autodesk applications, can force an Out-of-Bound Read and/or Out-of-Bound Write. A malicious actor can leverage this vulnerability to cause a crash,read sensitive data, or execute arbitrary code in the context of the current process. |
Title | Multiple Vulnerabilities in the Autodesk AutoCAD Desktop Software | |
Metrics |
cvssV3_1
|
cvssV3_1
|

Status: PUBLISHED
Assigner: autodesk
Published:
Updated: 2025-01-28T17:09:19.775Z
Reserved: 2024-01-11T21:51:08.013Z
Link: CVE-2024-23143

Updated: 2024-08-01T22:59:31.730Z

Status : Awaiting Analysis
Published: 2024-06-25T02:15:11.203
Modified: 2025-01-28T17:15:20.763
Link: CVE-2024-23143

No data.