First published: Tue Jul 13 2021(Updated: )
A vulnerability has been identified in JT2Go (All versions < V13.2), Teamcenter Visualization (All versions < V13.2). The Jt981.dll library in affected applications lacks proper validation of user-supplied data when parsing JT files. This could result in an out of bounds read past the end of an allocated buffer. An attacker could leverage this vulnerability to leak information in the context of the current process. (ZDI-CAN-13421)
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens JT2Go | <13.2.0 | |
Siemens Teamcenter Visualization | <13.2.0 | |
Siemens JT2Go | <13.2 | 13.2 |
Siemens Teamcenter Visualization | <13.2 | 13.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-34325 is classified as a medium severity vulnerability due to the potential for out of bounds read operations.
To fix CVE-2021-34325, upgrade to Siemens JT2Go and Teamcenter Visualization version 13.2 or higher.
CVE-2021-34325 affects all versions of Siemens JT2Go and Teamcenter Visualization prior to version 13.2.
CVE-2021-34325 is a vulnerability in the Jt981.dll library that lacks proper validation of user-supplied data while parsing JT files.
Yes, CVE-2021-34325 could potentially allow an attacker to perform unauthorized operations through an out of bounds read.