The APDFL.dll contains a stack-based buffer overflow vulnerability that
could be triggered while parsing specially crafted PDF files. This could
allow an attacker to execute code in the context of the current
process.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/csaf/ssa-360681.json | Third Party Advisory |
https://cert-portal.siemens.com/productcert/html/ssa-360681.html | Patch Third Party Advisory |
https://www.cisa.gov/uscert/ics/advisories/icsa-22-349-15 | Third Party Advisory US Government Resource |
https://cert-portal.siemens.com/productcert/csaf/ssa-360681.json | Third Party Advisory |
https://cert-portal.siemens.com/productcert/html/ssa-360681.html | Patch Third Party Advisory |
https://www.cisa.gov/uscert/ics/advisories/icsa-22-349-15 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:18
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://cert-portal.siemens.com/productcert/csaf/ssa-360681.json - Third Party Advisory | |
References | () https://cert-portal.siemens.com/productcert/html/ssa-360681.html - Patch, Third Party Advisory | |
References | () https://www.cisa.gov/uscert/ics/advisories/icsa-22-349-15 - Third Party Advisory, US Government Resource |
07 Nov 2023, 03:50
Type | Values Removed | Values Added |
---|---|---|
Summary | The APDFL.dll contains a stack-based buffer overflow vulnerability that could be triggered while parsing specially crafted PDF files. This could allow an attacker to execute code in the context of the current process. |
Information
Published : 2023-01-13 01:15
Updated : 2024-11-21 07:18
NVD link : CVE-2022-3159
Mitre link : CVE-2022-3159
CVE.ORG link : CVE-2022-3159
JSON object : View
Products Affected
siemens
- jt2go
- teamcenter_visualization