First published: Tue Jul 13 2021(Updated: )
A vulnerability has been identified in JT2Go (All versions < V13.2), Teamcenter Visualization (All versions < V13.2). The Tiff_Loader.dll library in affected applications lacks proper validation of user-supplied data when parsing TIFF files. This could result in an out of bounds read past the end of an allocated buffer. An attacker could leverage this vulnerability to leak information in the context of the current process. (ZDI-CAN-13198)
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens JT2Go | <13.2.0 | |
Siemens Teamcenter Visualization | <13.2.0 | |
Siemens JT2Go | <13.2 | 13.2 |
Siemens Teamcenter Visualization | <13.2 | 13.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-34303.
The title of the vulnerability is 'Siemens JT2Go TIFF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability'.
The severity of CVE-2021-34303 is medium, with a severity value of 5.5.
This vulnerability can be exploited by remote attackers who can disclose sensitive information by tricking the target into visiting a malicious page or opening a malicious file.
Siemens JT2Go versions up to 13.2.0 and Siemens Teamcenter Visualization versions up to 13.2.0 are affected by CVE-2021-34303.