JT2Go <V2406.0003 Stack Buffer Overflow via PDF
CVE-2024-41902 Published on October 8, 2024
A vulnerability has been identified in JT2Go (All versions < V2406.0003). The affected application contains a stack-based buffer overflow vulnerability that could be triggered while parsing specially crafted PDF files. This could allow an attacker to execute code in the context of the current process.
Weakness Type
What is a Stack Overflow Vulnerability?
A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
CVE-2024-41902 has been classified to as a Stack Overflow vulnerability or weakness.
Products Associated with CVE-2024-41902
Want to know whenever a new CVE is published for Siemens Jt2go? stack.watch will email you.
Affected Versions
Siemens JT2Go:- Before V2406.0003 is affected.
- Before 2406.0003 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.