First published: Tue Dec 14 2021(Updated: )
A vulnerability has been identified in JT Utilities (All versions < V13.1.1.0), JTTK (All versions < V11.1.1.0). JTTK library in affected products is vulnerable to an out of bounds read past the end of an allocated buffer when parsing specially crafted JT files. An attacker could leverage this vulnerability to leak information in the context of the current process. (ZDI-CAN-15052)
Credit: productcert@siemens.com productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Jt Open Toolkit | <11.1.1.0 | |
Siemens Jt Utilities | <13.1.1.0 | |
<11.1.1.0 | ||
<13.1.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-44444 is medium with a severity value of 3.3.
JT Utilities versions < V13.1.1.0 and JTTK versions < V11.1.1.0 are affected by CVE-2021-44444.
An attacker can leverage the vulnerability by parsing specially crafted JT files, which may lead to an out of bounds read past the end of an allocated buffer.
Yes, you can find references for CVE-2021-44444 at the following links: [Microsoft Office MSDT Follina Proof of Concept](http://packetstormsecurity.com/files/167317/Microsoft-Office-MSDT-Follina-Proof-Of-Concept.html) and [Siemens ProductCERT SSA-802578](https://cert-portal.siemens.com/productcert/pdf/ssa-802578.pdf).
The Common Weakness Enumeration (CWE) ID associated with CVE-2021-44444 is CWE-125.