First published: Tue Dec 14 2021(Updated: )
A vulnerability has been identified in JT2Go (All versions < V13.2.0.5), Teamcenter Visualization (All versions < V13.2.0.5). The Jt1001.dll is vulnerable to an out of bounds read past the end of an allocated buffer when parsing specially crafted JT files. An attacker could leverage this vulnerability to leak information in the context of the current process. (ZDI-CAN-15102)
Credit: productcert@siemens.com productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens JT2Go | <13.2.0.5 | |
Siemens Teamcenter Visualization | <13.2.0.5 | |
Siemens JT2Go | ||
Siemens JT2Go | <13.2.0.5 | 13.2.0.5 |
Siemens Teamcenter Visualization | <13.2.0.5 | 13.2.0.5 |
<13.2.0.5 | ||
<13.2.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Siemens JT2Go vulnerability is CVE-2021-44012.
The title of this vulnerability is 'Siemens JT2Go JT File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability'.
The affected software for this vulnerability is Siemens JT2Go and Siemens Teamcenter Visualization.
The severity of CVE-2021-44012 is medium with a severity value of 5.5.
This vulnerability can be exploited by remote attackers who require user interaction, such as visiting a malicious page or opening a malicious file.