### [CVE-2024-1847](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1847) ![](https://img.shields.io/static/v1?label=Product&message=eDrawings&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=Release%20SOLIDWORKS%202023%20SP0%3C%3D%20Release%20SOLIDWORKS%202023%20SP5%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-125%20Out-of-bounds%20Read&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-416%20Use%20After%20Free&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-787%20Out-of-bounds%20Write&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-843%20Access%20of%20Resource%20Using%20Incompatible%20Type%20('Type%20Confusion')&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-908%20Use%20of%20Uninitialized%20Resource&color=brighgreen) ### Description Heap-based Buffer Overflow, Memory Corruption, Out-Of-Bounds Read, Out-Of-Bounds Write, Stack-based Buffer Overflow, Type Confusion, Uninitialized Variable, Use-After-Free vulnerabilities exist in the file reading procedure in eDrawings from Release SOLIDWORKS 2023 through Release SOLIDWORKS 2024. These vulnerabilities could allow an attacker to execute arbitrary code while opening a specially crafted CATPART, IPT, JT, SAT, STL, STP, X_B or X_T file. NOTE: CVE-2024-3298 and CVE-2024-3299 were SPLIT from this ID. ### POC #### Reference No PoCs from references. #### Github - https://github.com/fkie-cad/nvd-json-data-feeds