A heap-based buffer overflow exists in the DXF file reading procedure in Open Design Alliance Drawings SDK before 2023.6. The specific flaw exists within the parsing of DXF files. The issue results from the lack of proper validation of the length of user-supplied XRecord data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.
References
Link | Resource |
---|---|
https://www.opendesign.com/security-advisories | Vendor Advisory |
https://www.opendesign.com/security-advisories | Vendor Advisory |
Configurations
History
21 Nov 2024, 07:45
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.opendesign.com/security-advisories - Vendor Advisory |
Information
Published : 2023-04-15 01:15
Updated : 2024-11-21 07:45
NVD link : CVE-2023-22670
Mitre link : CVE-2023-22670
CVE.ORG link : CVE-2023-22670
JSON object : View
Products Affected
opendesign
- drawings_sdk
CWE
CWE-787
Out-of-bounds Write