A maliciously crafted STP and STEP file when parsed in ASMIMPORT228A.dll and ASMIMPORT229A.dll and through Autodesk applications can force an Out-of-Bound Write. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: autodesk
Published: 2024-02-21T23:36:13.617Z
Updated: 2024-08-01T22:59:30.563Z
Reserved: 2024-01-11T21:46:45.745Z
Link: CVE-2024-23120
Vulnrichment
Updated: 2024-08-01T22:59:30.563Z
NVD
Status : Awaiting Analysis
Published: 2024-02-22T00:15:52.510
Modified: 2024-08-01T13:47:05.543
Link: CVE-2024-23120
Redhat
No data.