{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-3298","assignerOrgId":"f5a594e6-46a7-4e60-8a08-0a786e70e433","state":"PUBLISHED","assignerShortName":"3DS","dateReserved":"2024-04-04T09:52:02.081Z","datePublished":"2024-04-04T15:11:24.865Z","dateUpdated":"2024-08-01T20:05:08.234Z"},"containers":{"cna":{"providerMetadata":{"orgId":"f5a594e6-46a7-4e60-8a08-0a786e70e433","shortName":"3DS","dateUpdated":"2024-04-04T15:11:24.865Z"},"title":"Out-Of-Bounds Write and Type Confusion vulnerabilities exist in the DWG and DXF file reading procedure in eDrawings from Release SOLIDWORKS 2023 through Release SOLIDWORKS 2024","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-787","description":"CWE-787 Out-of-bounds Write","type":"CWE"}]},{"descriptions":[{"lang":"en","cweId":"CWE-843","description":"CWE-843 Access of Resource Using Incompatible Type ('Type Confusion')","type":"CWE"}]}],"affected":[{"vendor":"Dassault Systèmes","product":"eDrawings","versions":[{"status":"affected","version":"Release SOLIDWORKS 2023 SP0","lessThanOrEqual":"Release SOLIDWORKS 2023 SP5","versionType":"custom"},{"status":"affected","version":"Release SOLIDWORKS 2024 SP0","lessThanOrEqual":"Release SOLIDWORKS 2024 SP1","versionType":"custom"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"Out-Of-Bounds Write and Type Confusion vulnerabilities exist in the file reading procedure in eDrawings from Release SOLIDWORKS 2023 through Release SOLIDWORKS 2024. These vulnerabilities could allow an attacker to execute arbitrary code while opening a specially crafted DWG or DXF. NOTE: this vulnerability was SPLIT from CVE-2024-1847.","supportingMedia":[{"type":"text/html","base64":false,"value":"Out-Of-Bounds Write and Type Confusion vulnerabilities exist in the file reading procedure in eDrawings from Release SOLIDWORKS 2023 through Release SOLIDWORKS 2024. These vulnerabilities could allow an attacker to execute arbitrary code while opening a specially crafted DWG or DXF. NOTE: this vulnerability was SPLIT from CVE-2024-1847."}]}],"references":[{"url":"https://www.3ds.com/vulnerability/advisories"}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV3_1":{"version":"3.1","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseSeverity":"HIGH","baseScore":7.8,"vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}}],"source":{"discovery":"EXTERNAL"},"x_generator":{"engine":"Vulnogram 0.1.0-dev"},"credits":[{"lang":"en","value":"Mat Powell of Trend Micro Zero Day Initiative","user":"00000000-0000-4000-9000-000000000000","type":"finder"},{"lang":"en","value":"Mat Powell & Michael DePlante (@izobashi) of Trend Micro's Zero Day Initiative","user":"00000000-0000-4000-9000-000000000000","type":"finder"}]},"adp":[{"affected":[{"vendor":"3ds","product":"edrawings","cpes":["cpe:2.3:a:3ds:edrawings:2023:sp0:*:*:*:*:*:*"],"defaultStatus":"unaffected","versions":[{"version":"2023","status":"affected","lessThanOrEqual":"2023_sp5","versionType":"custom"}]},{"vendor":"3ds","product":"edrawings","cpes":["cpe:2.3:a:3ds:edrawings:2024:sp0:*:*:*:*:*:*"],"defaultStatus":"unaffected","versions":[{"version":"2024","status":"affected","lessThanOrEqual":"2024_sp1","versionType":"custom"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-04-05T17:12:50.417213Z","id":"CVE-2024-3298","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-07-26T15:36:42.776Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T20:05:08.234Z"},"title":"CVE Program Container","references":[{"url":"https://www.3ds.com/vulnerability/advisories","tags":["x_transferred"]}]}]}}