First published: Sat Apr 15 2023(Updated: )
A heap-based buffer overflow exists in the DXF file reading procedure in Open Design Alliance Drawings SDK before 2023.6. The specific flaw exists within the parsing of DXF files. The issue results from the lack of proper validation of the length of user-supplied XRecord data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Opendesign Drawings Sdk | <2023.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID CVE-2023-22670 refers to a heap-based buffer overflow in the DXF file reading procedure in Open Design Alliance Drawings SDK.
The severity of the vulnerability CVE-2023-22670 is high with a CVSS score of 7.8.
The software affected by CVE-2023-22670 is Open Design Alliance Drawings SDK before version 2023.6.
The Common Weakness Enumeration (CWE) ID for CVE-2023-22670 is CWE-119 and CWE-787.
To fix the vulnerability CVE-2023-22670, it is recommended to update the Open Design Alliance Drawings SDK to version 2023.6 or higher.