Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-qxp7-w377-c4f4

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

A vulnerability has been identified in Solid Edge SE2020 (All Versions < 2020MP14), Solid Edge SE2021 (All Versions < SE2021MP5). The jutil.dll library lacks proper validation of user-supplied data when parsing DFT files. This could result in an out of bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-12994)

A vulnerability has been identified in Solid Edge SE2020 (All Versions < 2020MP14), Solid Edge SE2021 (All Versions < SE2021MP5). The jutil.dll library lacks proper validation of user-supplied data when parsing DFT files. This could result in an out of bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-12994)

EPSS

Процентиль: 73%
0.00783
Низкий

Дефекты

CWE-787

Связанные уязвимости

CVSS3: 8.8
nvd
больше 4 лет назад

The jutil.dll library in all versions of Solid Edge SE2020 before 2020MP14 and all versions of Solid Edge SE2021 before SE2021MP5 lack proper validation of user-supplied data when parsing DFT files. This could result in an out-of-bounds write past the end of an allocation structure. An attacker could leverage this vulnerability to execute code in the context of the current process.

CVSS3: 7.8
fstec
больше 4 лет назад

Уязвимость динамически подключаемой библиотеки jutil.dll набора инструментов для проектирования и моделирования Siemens Solid Edge, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 73%
0.00783
Низкий

Дефекты

CWE-787