First published: Tue Jul 13 2021(Updated: )
A vulnerability has been identified in JT2Go (All versions < V13.2), Teamcenter Visualization (All versions < V13.2). The Tiff_loader.dll library in affected applications lacks proper validation of user-supplied data when parsing TIFF files. This could result in an out of bounds read past the end of an allocated buffer. An attacker could leverage this vulnerability to leak information in the context of the current process. (ZDI-CAN-13192)
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens JT2Go | <13.2.0 | |
Siemens Teamcenter Visualization | <13.2.0 | |
Siemens JT2Go | <13.2 | 13.2 |
Siemens Teamcenter Visualization | <13.2 | 13.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-34299 is classified as a medium severity vulnerability due to the potential for out of bounds read when handling TIFF files.
To mitigate CVE-2021-34299, update Siemens JT2Go and Teamcenter Visualization to version 13.2 or later.
All versions of Siemens JT2Go and Teamcenter Visualization prior to version 13.2 are affected by CVE-2021-34299.
Systems using affected versions of Siemens JT2Go and Teamcenter Visualization that process TIFF files are at risk from CVE-2021-34299.
Exploitation of CVE-2021-34299 could lead to potential crashes or leaks of sensitive information due to the out of bounds read.