A maliciously crafted SLDPRT file in ASMkern228A.dll when parsed through Autodesk applications can be used in user-after-free vulnerability. This vulnerability, along with other vulnerabilities, could lead to code execution in the current process.
References
| Link | Resource |
|---|---|
| https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0002 | Vendor Advisory |
| https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0004 | Vendor Advisory |
| https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0002 | Vendor Advisory |
| https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0004 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
Configuration 7 (hide)
|
Configuration 8 (hide)
|
Configuration 9 (hide)
|
History
No history.
Information
Published : 2024-02-22 05:15
Updated : 2025-08-26 21:15
NVD link : CVE-2024-23135
Mitre link : CVE-2024-23135
CVE.ORG link : CVE-2024-23135
JSON object : View
Products Affected
autodesk
- autocad_electrical
- autocad_map_3d
- autocad
- autocad_mep
- autocad_mechanical
- autocad_plant_3d
- autocad_architecture
- advance_steel
- civil_3d
CWE
CWE-416
Use After Free
