cvelist/2021/44xxx/CVE-2021-44439.json

72 lines
2.5 KiB
JSON
Raw Normal View History

2021-11-30 12:01:05 +00:00
{
"CVE_data_meta": {
2021-12-14 11:09:31 +00:00
"ASSIGNER": "productcert@siemens.com",
2021-11-30 12:01:05 +00:00
"ID": "CVE-2021-44439",
2021-12-14 11:09:31 +00:00
"STATE": "PUBLIC"
},
"data_format": "MITRE",
"data_version": "4.0",
"data_type": "CVE",
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Siemens",
"product": {
"product_data": [
{
"product_name": "JT Utilities",
"version": {
"version_data": [
{
"version_value": "All versions < V13.1.1.0"
}
]
}
},
{
"product_name": "JTTK",
"version": {
"version_data": [
{
"version_value": "All versions < V11.1.1.0"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-125: Out-of-bounds Read"
}
]
}
]
2021-11-30 12:01:05 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2021-12-14 13:01:21 +00:00
"value": "A vulnerability has been identified in JT Utilities (All versions < V13.1.1.0), JTTK (All versions < V11.1.1.0). JTTK library in affected products is vulnerable to an out of bounds read past the end of an allocated buffer when parsing specially crafted JT files. An attacker could leverage this vulnerability to leak information in the context of the current process. (ZDI-CAN-14908)"
2021-12-14 11:09:31 +00:00
}
]
},
"references": {
"reference_data": [
{
2021-12-14 13:01:21 +00:00
"refsource": "MISC",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-802578.pdf",
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-802578.pdf"
2021-11-30 12:01:05 +00:00
}
]
}
}