The jutil.dll library in all versions of Solid Edge SE2020 before 2020MP14 and all versions of Solid Edge SE2021 before SE2021MP5 lack proper validation of user-supplied data when parsing DFT files. This could result in an out-of-bounds write past the end of an allocation structure. An attacker could leverage this vulnerability to execute code in the context of the current process.
Advisories
Source ID Title
EUVD EUVD EUVD-2021-18253 The jutil.dll library in all versions of Solid Edge SE2020 before 2020MP14 and all versions of Solid Edge SE2021 before SE2021MP5 lack proper validation of user-supplied data when parsing DFT files. This could result in an out-of-bounds write past the end of an allocation structure. An attacker could leverage this vulnerability to execute code in the context of the current process.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: siemens

Published:

Updated: 2024-08-03T22:55:53.574Z

Reserved: 2021-04-15T00:00:00

Link: CVE-2021-31343

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-06-08T20:15:08.987

Modified: 2024-11-21T06:05:27.497

Link: CVE-2021-31343

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.