A vulnerability has been identified in JT2Go (All versions < V14.3.0.1), Teamcenter Visualization V13.3 (All versions < V13.3.0.12), Teamcenter Visualization V14.0 (All versions), Teamcenter Visualization V14.1 (All versions < V14.1.0.11), Teamcenter Visualization V14.2 (All versions < V14.2.0.6), Teamcenter Visualization V14.3 (All versions < V14.3.0.1), Tecnomatix Plant Simulation V2201 (All versions < V2201.0010), Tecnomatix Plant Simulation V2302 (All versions < V2302.0004). The affected application contains an out of bounds write past the end of an allocated structure while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-20825)
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-278349.pdf | Vendor Advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-478780.pdf | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2023-09-12 10:15
Updated : 2024-02-16 15:08
NVD link : CVE-2023-38072
Mitre link : CVE-2023-38072
CVE.ORG link : CVE-2023-38072
JSON object : View
Products Affected
siemens
- teamcenter_visualization
- tecnomatix_plant_simulation
- jt2go
CWE
CWE-787
Out-of-bounds Write