First published: Tue Dec 14 2021(Updated: )
A vulnerability has been identified in JT Utilities (All versions < V13.1.1.0), JTTK (All versions < V11.1.1.0). JTTK library in affected products contains an out of bounds write past the fixed-length heap-based buffer while parsing specially crafted JT files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-15054)
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Jt Open Toolkit | <11.1.1.0 | |
Siemens Jt Utilities | <13.1.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-44445 is high.
JT Utilities versions prior to V13.1.1.0 and JTTK versions prior to V11.1.1.0 are affected by CVE-2021-44445.
The vulnerability in Siemens JT Utilities and JTTK is an out of bounds write past the fixed-length heap-based buffer while parsing specially crafted JT files.
An attacker can exploit CVE-2021-44445 to execute arbitrary code.
Yes, updating to JT Utilities V13.1.1.0 or later and JTTK V11.1.1.0 or later will fix the vulnerability.