First published: Tue Dec 14 2021(Updated: )
A vulnerability has been identified in JT Utilities (All versions < V13.1.1.0), JTTK (All versions < V11.1.1.0). JTTK library in affected products is vulnerable to stack based buffer overflow while parsing specially crafted JT files. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-14903)
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Jt Open Toolkit | <11.1.1.0 | |
Siemens Jt Utilities | <13.1.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-44435 is high.
The affected software versions for CVE-2021-44435 are JT Utilities versions < V13.1.1.0 and JTTK versions < V11.1.1.0.
CVE-2021-44435 is a stack-based buffer overflow vulnerability in the JTTK library, which allows an attacker to execute code by parsing specially crafted JT files.
An attacker can exploit CVE-2021-44435 by leveraging the stack-based buffer overflow vulnerability in the JTTK library while parsing specially crafted JT files.
Please refer to the official Siemens advisory (link provided in the references) for information on available fixes or patches for CVE-2021-44435.