CVE-2023-41139
23.11.2023, 04:15
A maliciously crafted STP file when parsed through Autodesk AutoCAD 2024 and 2023 can be used to dereference an untrusted pointer. This vulnerability, along with other vulnerabilities, could lead to code execution in the current process.Enginsight
Vendor | Product | Version |
---|---|---|
autodesk | autocad | 𝑥 < 2024.1 |
autodesk | autocad | 2023.0.0 ≤ 𝑥 < 2023.1.4 |
autodesk | autocad | 2024.0.0 ≤ 𝑥 < 2024.1.1 |
autodesk | autocad_advance_steel | 𝑥 < 2023.1.4 |
autodesk | autocad_advance_steel | 2024.0.0 ≤ 𝑥 < 2024.1.1 |
autodesk | autocad_architecture | 𝑥 < 2023.1.4 |
autodesk | autocad_architecture | 2024.0.0 ≤ 𝑥 < 2024.1.1 |
autodesk | autocad_civil_3d | 𝑥 < 2023.1.4 |
autodesk | autocad_civil_3d | 2024.0.0 ≤ 𝑥 < 2024.1.1 |
autodesk | autocad_electrical | 𝑥 < 2023.1.4 |
autodesk | autocad_electrical | 2024.0.0 ≤ 𝑥 < 2024.1.1 |
autodesk | autocad_lt | 𝑥 < 2023.1.4 |
autodesk | autocad_lt | 𝑥 < 2024.1 |
autodesk | autocad_lt | 2024.0.0 ≤ 𝑥 < 2024.1.1 |
autodesk | autocad_map_3d | 𝑥 < 2023.1.4 |
autodesk | autocad_map_3d | 2024.0.0 ≤ 𝑥 < 2024.1.1 |
autodesk | autocad_mechanical | 𝑥 < 2023.1.4 |
autodesk | autocad_mechanical | 2024.0.0 ≤ 𝑥 < 2024.1.1 |
autodesk | autocad_mep | 𝑥 < 2023.1.4 |
autodesk | autocad_mep | 2024.0.0 ≤ 𝑥 < 2024.1.1 |
autodesk | autocad_plant_3d | 𝑥 < 2023.1.4 |
autodesk | autocad_plant_3d | 2024.0.0 ≤ 𝑥 < 2024.1.1 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-822 - Untrusted Pointer DereferenceThe program obtains a value from an untrusted source, converts this value to a pointer, and dereferences the resulting pointer.
- CWE-119 - Improper Restriction of Operations within the Bounds of a Memory BufferThe software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.