Page 16 of 115 results (0.008 seconds)

CVSS: 7.1EPSS: 0%CPEs: 4EXPL: 0

An out-of-bounds read issue exists in the DWG file-recovering procedure in the Drawings SDK (All versions prior to 2022.5) resulting from the lack of proper validation of user-supplied data. This can result in a read past the end of an allocated buffer and allow attackers to cause a denial-of-service condition or read sensitive information from memory locations. Se presenta un problema de lectura fuera de límites en el procedimiento de recuperación de archivos DWG en Drawings SDK (todas las versiones anteriores a 2022.4) resultando en una falta de comprobación apropiada de los datos suministrados por el usuario. Esto puede resultar en una lectura más allá del final de un búfer asignado y permitir a atacantes causar una condición de denegación de servicio o leer información confidencial de las ubicaciones de memoria This vulnerability allows remote attackers to disclose sensitive information on affected installations of Siemens JT2Go. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DWG files. • https://cert-portal.siemens.com/productcert/pdf/ssa-155599.pdf https://cert-portal.siemens.com/productcert/pdf/ssa-365397.pdf https://us-cert.cisa.gov/ics/advisories/icsa-21-159-02 https://www.zerodayinitiative.com/advisories/ZDI-21-986 • CWE-125: Out-of-bounds Read •

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 0

An out-of-bounds write issue exists in the DXF file-recovering procedure in the Drawings SDK (All versions prior to 2022.4) resulting from the lack of proper validation of user-supplied data. This can result in a write past the end of an allocated buffer and allow attackers to cause a denial-of-service condition or execute code in the context of the current process. Se presenta un problema de escritura fuera de límites en el procedimiento de recuperación de archivos DXF en Drawings SDK (todas las versiones anteriores a 2022.4) resultando en una falta de comprobación apropiada de los datos suministrados por el usuario. Esto puede resultar en una escritura más allá del final de un búfer asignado y permitir a atacantes causar una condición de denegación de servicio o ejecutar código en el contexto del proceso actual This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens JT2Go. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DXF files. • https://cert-portal.siemens.com/productcert/pdf/ssa-155599.pdf https://cert-portal.siemens.com/productcert/pdf/ssa-365397.pdf https://cert-portal.siemens.com/productcert/pdf/ssa-491245.pdf https://us-cert.cisa.gov/ics/advisories/icsa-21-159-02 https://www.zerodayinitiative.com/advisories/ZDI-21-982 • CWE-787: Out-of-bounds Write •

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 0

An out-of-bounds write issue exists in the DWG file-reading procedure in the Drawings SDK (All versions prior to 2022.4) resulting from the lack of proper validation of user-supplied data. This can result in a write past the end of an allocated buffer and allow attackers to cause a denial-of-service condition or execute code in the context of the current process. Se presenta un problema de escritura fuera de límites en el procedimiento de lectura de archivos DWG en Drawings SDK (todas las versiones anteriores a 2022.4) resultando en una falta de comprobación apropiada de los datos suministrados por el usuario. Esto puede resultar en una escritura más allá del final de un búfer asignado y permitir a atacantes causar una condición de denegación de servicio o ejecutar código en el contexto del proceso actual This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens JT2Go. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DWG files. • https://cert-portal.siemens.com/productcert/pdf/ssa-155599.pdf https://cert-portal.siemens.com/productcert/pdf/ssa-365397.pdf https://cert-portal.siemens.com/productcert/pdf/ssa-491245.pdf https://us-cert.cisa.gov/ics/advisories/icsa-21-159-02 https://www.zerodayinitiative.com/advisories/ZDI-21-984 • CWE-787: Out-of-bounds Write •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

A vulnerability has been identified in JT2Go (All versions < V13.1.0.3), Teamcenter Visualization (All versions < V13.1.0.3). The TIFF_loader.dll library in affected applications lacks proper validation of user-supplied data when parsing TIFF files. This could result in an out of bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-13131) Se ha identificado una vulnerabilidad en JT2Go (Todas las versiones anteriores a V13.1.0.3), Teamcenter Visualization (Todas las versiones anteriores a V13.1.0.3). • https://cert-portal.siemens.com/productcert/pdf/ssa-645530.pdf https://www.zerodayinitiative.com/advisories/ZDI-21-694 • CWE-787: Out-of-bounds Write •

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 0

A vulnerability has been identified in JT2Go (All versions < V13.1.0.1), Teamcenter Visualization (All versions < V13.1.0.1). Affected applications lack proper validation of user-supplied data when parsing of HPG files. This could result in a memory access past the end of an allocated buffer. An attacker could leverage this vulnerability to access data in the context of the current process. (ZDI-CAN-12207) Se ha identificado una vulnerabilidad en JT2Go (Todas las versiones anteriores a V13.1.0.1), Teamcenter Visualization (Todas las versiones anteriores a V13.1.0.1). • https://cert-portal.siemens.com/productcert/pdf/ssa-663999.pdf https://www.zerodayinitiative.com/advisories/ZDI-21-233 https://www.zerodayinitiative.com/advisories/ZDI-21-234 • CWE-125: Out-of-bounds Read •