First published: Tue Dec 14 2021(Updated: )
A vulnerability has been identified in JT Utilities (All versions < V13.1.1.0), JTTK (All versions < V11.1.1.0). JTTK library in affected products is vulnerable to an out of bounds read past the end of an allocated buffer when parsing specially crafted JT files. An attacker could leverage this vulnerability to leak information in the context of the current process. (ZDI-CAN-14908)
Credit: productcert@siemens.com productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Jt Open Toolkit | <11.1.1.0 | |
Siemens Jt Utilities | <13.1.1.0 | |
<11.1.1.0 | ||
<13.1.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-44439 is high (7.8).
The affected software of CVE-2021-44439 is Siemens JT Utilities (All versions < V13.1.1.0) and Siemens JTTK (All versions < V11.1.1.0).
CVE-2021-44439 is a vulnerability in the JTTK library of the affected software that allows for an out of bounds read past the end of an allocated buffer when parsing specially crafted JT files.
An attacker can leverage CVE-2021-44439 to exploit the vulnerability in the JTTK library of the affected software by providing specially crafted JT files.
More information about CVE-2021-44439 can be found at the following reference: [Link to Siemens ProductCERT](https://cert-portal.siemens.com/productcert/pdf/ssa-802578.pdf).