The APDFL.dll in Siemens JT2Go prior to V13.3.0.5 and Siemens Teamcenter Visualization prior to V14.0.0.2 contains an out of bounds write past the fixed-length heap-based buffer while parsing specially crafted PDF files. This could allow an attacker to execute code in the context of the current process.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-829738.pdf | Vendor Advisory |
https://www.cisa.gov/uscert/ics/advisories/icsa-22-195-07 | Third Party Advisory US Government Resource |
https://cert-portal.siemens.com/productcert/pdf/ssa-829738.pdf | Vendor Advisory |
https://www.cisa.gov/uscert/ics/advisories/icsa-22-195-07 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:00
Type | Values Removed | Values Added |
---|---|---|
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-829738.pdf - Vendor Advisory | |
References | () https://www.cisa.gov/uscert/ics/advisories/icsa-22-195-07 - Third Party Advisory, US Government Resource |
Information
Published : 2022-10-20 17:15
Updated : 2024-11-21 07:00
NVD link : CVE-2022-2069
Mitre link : CVE-2022-2069
CVE.ORG link : CVE-2022-2069
JSON object : View
Products Affected
siemens
- jt2go
- teamcenter_visualization