CVE-2021-31343 – Siemens Solid Edge Viewer DFT File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2021-31343
The jutil.dll library in all versions of Solid Edge SE2020 before 2020MP14 and all versions of Solid Edge SE2021 before SE2021MP5 lack proper validation of user-supplied data when parsing DFT files. This could result in an out-of-bounds write past the end of an allocation structure. An attacker could leverage this vulnerability to execute code in the context of the current process. La biblioteca jutil.dll en todas las versiones de Solid Edge SE2020 antes de 2020MP14 y todas las versiones de Solid Edge SE2021 antes de SE2021MP5 carecen de la validación adecuada de los datos suministrados por el usuario al analizar los archivos DFT. Esto podría dar lugar a una escritura fuera de límites más allá del final de una estructura de asignación. • https://us-cert.cisa.gov/ics/advisories/icsa-21-159-09 https://www.zerodayinitiative.com/advisories/ZDI-21-999 • CWE-787: Out-of-bounds Write •
CVE-2021-31342 – Siemens Solid Edge Viewer DFT File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2021-31342
The ugeom2d.dll library in all versions of Solid Edge SE2020 before 2020MP14 and all versions of Solid Edge SE2021 before SE2021MP5 lack proper validation of user-supplied data when parsing DFT files. This could result in an out-of-bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process. La biblioteca ugeom2d.dll en todas las versiones de Solid Edge SE2020 antes de 2020MP14 y todas las versiones de Solid Edge SE2021 antes de SE2021MP5 carecen de la validación adecuada de los datos suministrados por el usuario al analizar los archivos DFT. Esto podría dar lugar a una escritura fuera de los límites más allá del final de una estructura asignada. • https://us-cert.cisa.gov/ics/advisories/icsa-21-159-09 https://www.zerodayinitiative.com/advisories/ZDI-21-998 • CWE-787: Out-of-bounds Write •
CVE-2021-27488 – Siemens Solid Edge Viewer CATPart File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2021-27488
Datakit Software libraries CatiaV5_3dRead, CatiaV6_3dRead, Step3dRead, Ug3dReadPsr, Jt3dReadPsr modules in KeyShot Versions v10.1 and prior lack proper validation of user-supplied data when parsing CATPart files. This could result in an out-of-bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process. Las bibliotecas de Datakit Software CatiaV5_3dRead, CatiaV6_3dRead, Step3dRead, Ug3dReadPsr, Jt3dReadPsr en los módulos KeyShot Versiones v10.1 y anteriores, carecen de una comprobación apropiada de los datos suministrados por el usuario cuando se analizan archivos CATPart. Esto podría resultar en una escritura fuera de límites más allá del final de una estructura asignada. • https://cert-portal.siemens.com/productcert/pdf/ssa-119468.pdf https://us-cert.cisa.gov/ics/advisories/icsa-21-145-01 https://www.zerodayinitiative.com/advisories/ZDI-21-563 • CWE-787: Out-of-bounds Write •
CVE-2021-27496 – Siemens Solid Edge Viewer PRT File Parsing Untrusted Pointer Dereference Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2021-27496
Datakit Software libraries CatiaV5_3dRead, CatiaV6_3dRead, Step3dRead, Ug3dReadPsr, Jt3dReadPsr modules in KeyShot Versions v10.1 and prior lack proper validation of user-supplied data when parsing PRT files. This could lead to pointer dereferences of a value obtained from an untrusted source. An attacker could leverage this vulnerability to execute code in the context of the current process. Las bibliotecas de Datakit Software CatiaV5_3dRead, CatiaV6_3dRead, Step3dRead, Ug3dReadPsr, Jt3dReadPsr en los módulos de KeyShot Versiones v10.1 y anteriores, carecen de una comprobación apropiada de los datos suministrados por el usuario cuando se analizan archivos PRT. Esto podría conllevar a desreferencias de puntero de un valor obtenido de una fuente no confiable. • https://cert-portal.siemens.com/productcert/pdf/ssa-119468.pdf https://us-cert.cisa.gov/ics/advisories/icsa-21-145-01 https://www.zerodayinitiative.com/advisories/ZDI-21-565 • CWE-822: Untrusted Pointer Dereference •
CVE-2021-27490 – Siemens Solid Edge Viewer JT File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2021-27490
Datakit Software libraries CatiaV5_3dRead, CatiaV6_3dRead, Step3dRead, Ug3dReadPsr, Jt3dReadPsr modules in KeyShot Versions v10.1 and prior are vulnerable to an out-of-bounds read, which may allow an attacker to execute arbitrary code. Las bibliotecas de Datakit Software CatiaV5_3dRead, CatiaV6_3dRead, Step3dRead, Ug3dReadPsr, Jt3dReadPsr en los módulos de KeyShot Versiones v10.1 y anteriores, son vulnerables a una lectura fuera de límites, lo que puede permitir a un atacante ejecutar código arbitrario This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens Solid Edge Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JT files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated data structure. An attacker can leverage this vulnerability to execute code in the context of the current process. • https://cert-portal.siemens.com/productcert/pdf/ssa-119468.pdf https://us-cert.cisa.gov/ics/advisories/icsa-21-145-01 https://www.zerodayinitiative.com/advisories/ZDI-21-566 • CWE-125: Out-of-bounds Read •