cve/2024/CVE-2024-26275.md
2025-09-29 16:08:36 +00:00

29 lines
2.1 KiB
Markdown

### [CVE-2024-26275](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26275)
![](https://img.shields.io/static/v1?label=Product&message=JT2Go&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Parasolid%20V35.1&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Parasolid%20V36.0&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Parasolid%20V36.1&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Teamcenter%20Visualization%20V14.2&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Teamcenter%20Visualization%20V14.3&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Teamcenter%20Visualization%20V2312&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%20V14.2.0.12%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%20V14.3.0.9%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%20V2312.0004%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%20V35.1.254%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%20V36.0.207%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%20V36.1.147%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-125%3A%20Out-of-bounds%20Read&color=brighgreen)
### Description
A vulnerability has been identified in JT2Go (All versions < V2312.0004), Parasolid V35.1 (All versions < V35.1.254), Parasolid V36.0 (All versions < V36.0.207), Parasolid V36.1 (All versions < V36.1.147), Teamcenter Visualization V14.2 (All versions < V14.2.0.12), Teamcenter Visualization V14.3 (All versions < V14.3.0.9), Teamcenter Visualization V2312 (All versions < V2312.0004). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted X_T files. This could allow an attacker to execute code in the context of the current process.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/JsHuang/CVE-Assigned