A vulnerability has been identified in JT Open (All versions < V11.3.2.0), JT Utilities (All versions < V13.3.0.0). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted JT files. This could allow an attacker to execute code in the context of the current process.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-642810.pdf | Vendor Advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-642810.pdf | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:56
Type | Values Removed | Values Added |
---|---|---|
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-642810.pdf - Vendor Advisory |
Information
Published : 2023-04-11 10:15
Updated : 2024-11-21 07:56
NVD link : CVE-2023-29053
Mitre link : CVE-2023-29053
CVE.ORG link : CVE-2023-29053
JSON object : View
Products Affected
siemens
- jt_utilities
- jt_open_toolkit
CWE
CWE-125
Out-of-bounds Read