First published: Tue Jul 13 2021(Updated: )
A vulnerability has been identified in JT2Go (All versions < V13.2), Teamcenter Visualization (All versions < V13.2). The JPEG2K_Loader.dll library in affected applications lacks proper validation of user-supplied data when parsing J2K files. This could result in an out of bounds read past the end of an allocated buffer. An attacker could leverage this vulnerability to leak information in the context of the current process. (ZDI-CAN-13416)
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens JT2Go | <13.2.0 | |
Siemens Teamcenter Visualization | <13.2.0 | |
Siemens JT2Go | <13.2 | 13.2 |
Siemens Teamcenter Visualization | <13.2 | 13.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-34322 is rated as high severity due to its potential to cause out of bounds read vulnerabilities.
To mitigate CVE-2021-34322, update the affected software to version 13.2 or later.
CVE-2021-34322 affects Siemens JT2Go and Siemens Teamcenter Visualization versions prior to 13.2.
CVE-2021-34322 is a vulnerability related to improper validation of user-supplied data in the JPEG2K_Loader.dll library.
Exploiting CVE-2021-34322 could result in potential memory corruption and application crashes due to out of bounds reading.