{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-15T13:02:00.077","vulnerabilities":[{"cve":{"id":"CVE-2023-5179","sourceIdentifier":"8a9629cb-c5e7-4d2a-a894-111e8039b7ea","published":"2023-11-07T16:15:29.550","lastModified":"2024-11-21T08:41:14.720","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"An issue was discovered in Open Design Alliance Drawings SDK before 2024.10. A corrupted value for the start of MiniFat sector in a crafted DGN file leads to an out-of-bounds read. This can allow attackers to cause a crash, potentially enabling a denial-of-service attack (Crash, Exit, or Restart) or possible code execution. \n\n\n\n\n"},{"lang":"es","value":"Se descubrió un problema en Open Design Alliance Drawings SDK antes de la versión 2024.10. Un valor dañado para el inicio del sector MiniFat en un archivo DGN manipulado genera una lectura fuera de los límites. Esto puede permitir a los atacantes provocar un bloqueo, lo que podría permitir un ataque de Denegación de Servicio (DoS) (bloqueo, salida o reinicio) o una posible ejecución de código."}],"metrics":{"cvssMetricV31":[{"source":"8a9629cb-c5e7-4d2a-a894-111e8039b7ea","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1\/AV:L\/AC:L\/PR:N\/UI:R\/S:U\/C:H\/I:H\/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1\/AV:L\/AC:L\/PR:N\/UI:R\/S:U\/C:H\/I:H\/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}]},"weaknesses":[{"source":"8a9629cb-c5e7-4d2a-a894-111e8039b7ea","type":"Secondary","description":[{"lang":"en","value":"CWE-125"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-125"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:opendesign:drawings_sdk:*:*:*:*:*:*:*:*","versionEndExcluding":"2024.10","matchCriteriaId":"163A6555-0C98-45A6-99E1-E7DF7D977DE8"}]}]}],"references":[{"url":"https:\/\/www.opendesign.com\/security-advisories","source":"8a9629cb-c5e7-4d2a-a894-111e8039b7ea","tags":["Vendor Advisory"]},{"url":"https:\/\/www.opendesign.com\/security-advisories","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}