First published: Tue Dec 14 2021(Updated: )
A vulnerability has been identified in JT Utilities (All versions < V13.1.1.0), JTTK (All versions < V11.1.1.0). JTTK library in affected products is vulnerable to stack based buffer overflow while parsing specially crafted JT files. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-14845)
Credit: productcert@siemens.com productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Jt Open Toolkit | <11.1.1.0 | |
Siemens Jt Utilities | <13.1.1.0 | |
<11.1.1.0 | ||
<13.1.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2021-44432.
The severity level of CVE-2021-44432 is high with a score of 7.8.
The Siemens JT Open Toolkit versions prior to 11.1.1.0 and Siemens JT Utilities versions prior to 13.1.1.0 are affected by CVE-2021-44432.
The vulnerability in JT Utilities and JTTK allows an attacker to execute code in the system through a stack-based buffer overflow when parsing specially crafted JT files.
You can find more information about CVE-2021-44432 in the Siemens ProductCERT advisory at https://cert-portal.siemens.com/productcert/pdf/ssa-802578.pdf.