First published: Tue Oct 08 2024(Updated: )
A vulnerability has been identified in JT2Go (All versions < V2406.0003). The affected application contains a stack-based buffer overflow vulnerability that could be triggered while parsing specially crafted PDF files. This could allow an attacker to execute code in the context of the current process.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens JT2Go | <2406.0003 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-41902 has been rated as critical due to its potential to allow arbitrary code execution via a stack-based buffer overflow.
To fix CVE-2024-41902, upgrade JT2Go to version 2406.0003 or later.
CVE-2024-41902 impacts all versions of JT2Go prior to version 2406.0003.
CVE-2024-41902 poses a risk as it could be exploited by attackers to execute malicious code within the application.
CVE-2024-41902 can be triggered while parsing specially crafted PDF files.