### [CVE-2024-3299](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3299) ![](https://img.shields.io/static/v1?label=Product&message=eDrawings&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=2023%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=2024%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=Release%20SOLIDWORKS%202023%20SP0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=Release%20SOLIDWORKS%202024%20SP0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-416%20Use%20After%20Free&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-787%20Out-of-bounds%20Write&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-908%20Use%20of%20Uninitialized%20Resource&color=brightgreen) ### Description Out-Of-Bounds Write, Use of Uninitialized Resource and Use-After-Free vulnerabilities exist in the file reading procedure in eDrawings from Release SOLIDWORKS 2023 through Release SOLIDWORKS 2024. These vulnerabilities could allow an attacker to execute arbitrary code while opening a specially crafted SLDDRW or SLDPRT file. NOTE: this vulnerability was SPLIT from CVE-2024-1847. ### POC #### Reference - https://www.3ds.com/vulnerability/advisories #### Github - https://github.com/fkie-cad/nvd-json-data-feeds