First published: Tue Jul 13 2021(Updated: )
A vulnerability has been identified in JT2Go (All versions < V13.2), Teamcenter Visualization (All versions < V13.2). The Jt981.dll library in affected applications lacks proper validation of user-supplied data when parsing JT files. This could result in an out of bounds read past the end of an allocated buffer. An attacker could leverage this vulnerability to leak information in the context of the current process. (ZDI-CAN-13406)
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens JT2Go | <13.2.0 | |
Siemens Teamcenter Visualization | <13.2.0 | |
Siemens JT2Go | <13.2 | 13.2 |
Siemens Teamcenter Visualization | <13.2 | 13.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-34320 is classified as a high severity vulnerability due to the potential for out of bounds read attacks.
To fix CVE-2021-34320, update JT2Go or Teamcenter Visualization to version 13.2 or later.
CVE-2021-34320 affects all versions of JT2Go and Teamcenter Visualization prior to version 13.2.
CVE-2021-34320 is a memory corruption vulnerability caused by improper validation of user-supplied data in the Jt981.dll library.
As of now, there are no publicly known exploits specifically targeting CVE-2021-34320.