First published: Tue Dec 14 2021(Updated: )
A vulnerability has been identified in JT2Go (All versions < V13.2.0.5), Teamcenter Visualization (All versions < V13.2.0.5). The Image.dll is vulnerable to an out of bounds read past the end of an allocated buffer when parsing specially crafted TIF files. An attacker could leverage this vulnerability to leak information in the context of the current process. (ZDI-CAN-15111)
Credit: productcert@siemens.com productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens JT2Go | <13.2.0.5 | |
Siemens Teamcenter Visualization | <13.2.0.5 | |
Siemens JT2Go | ||
Siemens JT2Go | <13.2.0.5 | 13.2.0.5 |
Siemens Teamcenter Visualization | <13.2.0.5 | 13.2.0.5 |
<13.2.0.5 | ||
<13.2.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-44017 is a vulnerability that allows remote attackers to disclose sensitive information on affected installations of Siemens JT2Go.
This vulnerability can be exploited by visiting a malicious page or opening a malicious file.
The severity of CVE-2021-44017 is medium, with a CVSS score of 5.5.
Siemens JT2Go versions up to and excluding 13.2.0.5 are affected by this vulnerability.
You can find more information about CVE-2021-44017 at the following references: [link](https://cert-portal.siemens.com/productcert/pdf/ssa-595101.pdf), [link](https://www.zerodayinitiative.com/advisories/ZDI-22-011/), [link](https://www.cisa.gov/uscert/ics/advisories/icsa-21-350-10).