First published: Tue Jul 13 2021(Updated: )
A vulnerability has been identified in JT2Go (All versions < V13.2), Teamcenter Visualization (All versions < V13.2). The VisDraw.dll library in affected applications lacks proper validation of user-supplied data when parsing J2K files. This could result in an out of bounds read past the end of an allocated buffer. An attacker could leverage this vulnerability to leak information in the context of the current process. (ZDI-CAN-13414)
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens JT2Go | <13.2.0 | |
Siemens Teamcenter Visualization | <13.2.0 | |
Siemens JT2Go | <13.2 | 13.2 |
Siemens Teamcenter Visualization | <13.2 | 13.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-34321 is classified as a high-severity vulnerability due to its potential for exploitation through improper data validation.
To fix CVE-2021-34321, upgrade to Siemens JT2Go or Teamcenter Visualization version 13.2 or later.
CVE-2021-34321 affects all versions of Siemens JT2Go and Teamcenter Visualization prior to version 13.2.
CVE-2021-34321 is a vulnerability related to an out of bounds read caused by inadequate validation of user-supplied data.
Yes, CVE-2021-34321 can potentially be exploited remotely if a user opens a specially crafted J2K file.