
CVE-2020-26987 – Siemens JT2Go TGA File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2020-26987
12 Jan 2021 — A vulnerability has been identified in JT2Go (All versions < V13.1.0), Teamcenter Visualization (All versions < V13.1.0). Affected applications lack proper validation of user-supplied data when parsing of TGA files. This could lead to a heap-based buffer overflow. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-12016, ZDI-CAN-12017) Se ha identificado una vulnerabilidad en JT2Go (Todas las versiones anteriores a V13.1.0), Teamcenter Visualization... • https://cert-portal.siemens.com/productcert/pdf/ssa-622830.pdf • CWE-122: Heap-based Buffer Overflow CWE-787: Out-of-bounds Write •

CVE-2020-26988 – Siemens JT2Go PAR File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2020-26988
12 Jan 2021 — A vulnerability has been identified in JT2Go (All versions < V13.1.0), Teamcenter Visualization (All versions < V13.1.0). Affected applications lack proper validation of user-supplied data when parsing of PAR files. This could result in an out of bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-11891) Se ha identificado una vulnerabilidad en JT2Go (Todas las versiones anteriores a V13.1.0), Team... • https://cert-portal.siemens.com/productcert/pdf/ssa-622830.pdf • CWE-787: Out-of-bounds Write •

CVE-2020-26989 – Siemens JT2Go PAR File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2020-26989
12 Jan 2021 — A vulnerability has been identified in JT2Go (All versions < V13.1.0.1), Solid Edge SE2020 (All Versions < SE2020MP12), Solid Edge SE2021 (All Versions < SE2021MP2), Teamcenter Visualization (All versions < V13.1.0.1). Affected applications lack proper validation of user-supplied data when parsing of PAR files. This could result in a stack based buffer overflow. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-11892) Se ha identificado una vulnera... • https://cert-portal.siemens.com/productcert/pdf/ssa-622830.pdf • CWE-121: Stack-based Buffer Overflow CWE-787: Out-of-bounds Write •

CVE-2020-26990 – Siemens JT2Go ASM File Parsing Type Confusion Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2020-26990
12 Jan 2021 — A vulnerability has been identified in JT2Go (All versions < V13.1.0.1), Teamcenter Visualization (All versions < V13.1.0.1). Affected applications lack proper validation of user-supplied data when parsing ASM files. A crafted ASM file could trigger a type confusion condition. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-11897) Se ha identificado una vulnerabilidad en JT2Go (Todas las versiones anteriores a V13.1.0.1), Teamcenter Visualization... • https://cert-portal.siemens.com/productcert/pdf/ssa-622830.pdf • CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') •

CVE-2020-26991 – Siemens JT2Go ASM File Parsing Untrusted Pointer Dereference Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2020-26991
12 Jan 2021 — A vulnerability has been identified in JT2Go (All versions < V13.1.0.2), Teamcenter Visualization (All versions < V13.1.0.2). Affected applications lack proper validation of user-supplied data when parsing ASM files. This could lead to pointer dereferences of a value obtained from untrusted source. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-11899) Se ha identificado una vulnerabilidad en JT2Go JT2Go (Todas las versiones anteriores a V13.1.0.... • https://cert-portal.siemens.com/productcert/pdf/ssa-622830.pdf • CWE-476: NULL Pointer Dereference CWE-822: Untrusted Pointer Dereference •

CVE-2020-26980 – Siemens JT2Go JT File Parsing Type Confusion Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2020-26980
12 Jan 2021 — A vulnerability has been identified in JT2Go (All versions < V13.1.0), Teamcenter Visualization (All versions < V13.1.0). Affected applications lack proper validation of user-supplied data when parsing JT files. A crafted JT file could trigger a type confusion condition. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-11881) Se ha identificado una vulnerabilidad en JT2Go (todas las versiones anteriores a V13.1.0), Teamcenter Visualization (todas ... • https://cert-portal.siemens.com/productcert/pdf/ssa-622830.pdf • CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') •

CVE-2020-26981 – Siemens JT2Go PLMXML File Parsing XML External Entity Processing Information Disclosure Vulnerability
https://notcve.org/view.php?id=CVE-2020-26981
12 Jan 2021 — A vulnerability has been identified in JT2Go (All versions < V13.1.0), Teamcenter Visualization (All versions < V13.1.0). When opening a specially crafted xml file, the application could disclose arbitrary files to remote attackers. This is because of the passing of specially crafted content to the underlying XML parser without taking proper restrictions such as prohibiting an external dtd. (ZDI-CAN-11890) Se ha identificado una vulnerabilidad en JT2Go (todas las versiones anteriores a V13.1.0), Teamcenter ... • https://cert-portal.siemens.com/productcert/pdf/ssa-622830.pdf • CWE-611: Improper Restriction of XML External Entity Reference •