A maliciously crafted MODEL 3DM, STP, or SLDASM file, when in opennurbs.dll parsed through Autodesk applications, can lead to a memory corruption vulnerability by write access violation. This vulnerability, in conjunction with other vulnerabilities, can lead to code execution in the context of the current process.
References
Link | Resource |
---|---|
https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0002 | Vendor Advisory |
https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0004 | Vendor Advisory |
https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0009 | Vendor Advisory |
https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0002 | Vendor Advisory |
https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0004 | Vendor Advisory |
https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0009 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
Configuration 7 (hide)
|
Configuration 8 (hide)
|
Configuration 9 (hide)
|
History
11 Apr 2025, 15:56
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-noinfo | |
CPE | cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:* cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:* cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:* cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:* cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:* cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:* cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:* cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:* cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:* |
|
First Time |
Autodesk autocad Architecture
Autodesk autocad Mechanical Autodesk autocad Autodesk civil 3d Autodesk autocad Plant 3d Autodesk autocad Map 3d Autodesk autocad Mep Autodesk Autodesk autocad Electrical Autodesk advance Steel |
|
References | () https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0002 - Vendor Advisory | |
References | () https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0004 - Vendor Advisory | |
References | () https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0009 - Vendor Advisory |
28 Jan 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
21 Nov 2024, 08:57
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0002 - | |
References | () https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0004 - | |
References | () https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0009 - |
01 Aug 2024, 13:47
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
25 Jun 2024, 01:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | (en) A maliciously crafted MODEL 3DM, STP, or SLDASM file, when in opennurbs.dll parsed through Autodesk applications, can lead to a memory corruption vulnerability by write access violation. This vulnerability, in conjunction with other vulnerabilities, can lead to code execution in the context of the current process. |
18 Mar 2024, 00:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | A maliciously crafted MODEL 3DM, STP or SLDASM files in opennurbs.dll when parsed through Autodesk AutoCAD could lead to a memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process. |
22 Feb 2024, 04:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-22 04:15
Updated : 2025-04-11 15:56
NVD link : CVE-2024-23129
Mitre link : CVE-2024-23129
CVE.ORG link : CVE-2024-23129
JSON object : View
Products Affected
autodesk
- advance_steel
- autocad_mep
- autocad_map_3d
- autocad_architecture
- autocad_mechanical
- autocad_electrical
- autocad
- civil_3d
- autocad_plant_3d
CWE