CVE-2024-26275

A vulnerability has been identified in JT2Go (All versions < V2312.0004), Parasolid V35.1 (All versions < V35.1.254), Parasolid V36.0 (All versions < V36.0.207), Parasolid V36.1 (All versions < V36.1.147), Teamcenter Visualization V14.2 (All versions < V14.2.0.12), Teamcenter Visualization V14.3 (All versions < V14.3.0.9), Teamcenter Visualization V2312 (All versions < V2312.0004). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted X_T files. This could allow an attacker to execute code in the context of the current process.
Configurations

No configuration.

History

21 Nov 2024, 09:02

Type Values Removed Values Added
References () https://cert-portal.siemens.com/productcert/html/ssa-222019.html - () https://cert-portal.siemens.com/productcert/html/ssa-222019.html -
References () https://cert-portal.siemens.com/productcert/html/ssa-771940.html - () https://cert-portal.siemens.com/productcert/html/ssa-771940.html -

13 Aug 2024, 08:15

Type Values Removed Values Added
Summary
  • (es) Se ha identificado una vulnerabilidad en JT2Go (Todas las versiones &lt; V2312.0004), Parasolid V35.1 (Todas las versiones &lt; V35.1.254), Parasolid V36.0 (Todas las versiones &lt; V36.0.207), Parasolid V36.1 (Todas las versiones &lt; V36.1.147), Teamcenter Visualization V14.2 (todas las versiones), Teamcenter Visualization V14.3 (todas las versiones &lt; V14.3.0.9), Teamcenter Visualization V2312 (todas las versiones &lt; V2312.0004). Las aplicaciones afectadas contienen una lectura fuera de los límites más allá del final de una estructura asignada mientras analizan archivos X_T especialmente manipulados. Esto podría permitir a un atacante ejecutar código en el contexto del proceso actual.
Summary (en) A vulnerability has been identified in JT2Go (All versions < V2312.0004), Parasolid V35.1 (All versions < V35.1.254), Parasolid V36.0 (All versions < V36.0.207), Parasolid V36.1 (All versions < V36.1.147), Teamcenter Visualization V14.2 (All versions), Teamcenter Visualization V14.3 (All versions < V14.3.0.9), Teamcenter Visualization V2312 (All versions < V2312.0004). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted X_T files. This could allow an attacker to execute code in the context of the current process. (en) A vulnerability has been identified in JT2Go (All versions < V2312.0004), Parasolid V35.1 (All versions < V35.1.254), Parasolid V36.0 (All versions < V36.0.207), Parasolid V36.1 (All versions < V36.1.147), Teamcenter Visualization V14.2 (All versions < V14.2.0.12), Teamcenter Visualization V14.3 (All versions < V14.3.0.9), Teamcenter Visualization V2312 (All versions < V2312.0004). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted X_T files. This could allow an attacker to execute code in the context of the current process.

11 Jun 2024, 12:15

Type Values Removed Values Added
References
  • () https://cert-portal.siemens.com/productcert/html/ssa-771940.html -
Summary (en) A vulnerability has been identified in Parasolid V35.1 (All versions < V35.1.254), Parasolid V36.0 (All versions < V36.0.207), Parasolid V36.1 (All versions < V36.1.147). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted X_T files. This could allow an attacker to execute code in the context of the current process. (en) A vulnerability has been identified in JT2Go (All versions < V2312.0004), Parasolid V35.1 (All versions < V35.1.254), Parasolid V36.0 (All versions < V36.0.207), Parasolid V36.1 (All versions < V36.1.147), Teamcenter Visualization V14.2 (All versions), Teamcenter Visualization V14.3 (All versions < V14.3.0.9), Teamcenter Visualization V2312 (All versions < V2312.0004). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted X_T files. This could allow an attacker to execute code in the context of the current process.

09 Apr 2024, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-09 09:15

Updated : 2024-11-21 09:02


NVD link : CVE-2024-26275

Mitre link : CVE-2024-26275

CVE.ORG link : CVE-2024-26275


JSON object : View

Products Affected

No product.

CWE
CWE-125

Out-of-bounds Read