Teamcenter & JT2Go <V14.1 Buffer Overflow via PDF (CVE-2022-41664)
CVE-2022-41664 Published on November 8, 2022

A vulnerability has been identified in JT2Go (All versions < V14.1.0.4), Teamcenter Visualization V13.2 (All versions < V13.2.0.12), Teamcenter Visualization V13.3 (All versions < V13.3.0.7), Teamcenter Visualization V14.0 (All versions < V14.0.0.3), Teamcenter Visualization V14.1 (All versions < V14.1.0.4). The affected application contains a stack-based buffer overflow vulnerability that could be triggered while parsing specially crafted PDF files. This could allow an attacker to execute code in the context of the current process.

NVD

Weakness Type

What is a Stack Overflow Vulnerability?

A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).

CVE-2022-41664 has been classified to as a Stack Overflow vulnerability or weakness.


Products Associated with CVE-2022-41664

stack.watch emails you whenever new vulnerabilities are published in Siemens Jt2go or Siemens Teamcenter Visualization. Just hit a watch button to start following.

 
 

Affected Versions

Siemens JT2Go: Siemens Teamcenter Visualization V13.2: Siemens Teamcenter Visualization V13.3: Siemens Teamcenter Visualization V14.0: Siemens Teamcenter Visualization V14.1:

Exploit Probability

EPSS
0.07%
Percentile
20.42%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.