Datalogics Library APDFLThe v18.0.4PlusP1e and prior contains a stack-based buffer overflow due to documents containing corrupted fonts, which could allow an attack that causes an unhandled crash during the rendering process.
Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2023-23933 | Datalogics Library APDFLThe v18.0.4PlusP1e and prior contains a stack-based buffer overflow due to documents containing corrupted fonts, which could allow an attack that causes an unhandled crash during the rendering process. |
Solution
Siemens has released updates for the affected products and recommends updating to the latest versions: * JT2Go: Update to V14.2.0.2 https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html or later version * Teamcenter Visualization V13.2: Update to V13.2.0.13 https://support.sw.siemens.com/ or later version * Teamcenter Visualization V13.3: Update to V13.3.0.9 https://support.sw.siemens.com/ or later version * Teamcenter Visualization V14.0: Update to V14.0.0.5 https://support.sw.siemens.com/ or later version * Teamcenter Visualization V14.1: Update to V14.1.0.7 https://support.sw.siemens.com/ or later version * Teamcenter Visualization V14.2: Update to V14.2.0.2 https://support.sw.siemens.com/ or later version
Workaround
Siemens has identified the following specific workarounds and mitigations that users can apply to reduce risks: * Avoid opening untrusted files in JT2Go and Teamcenter Visualization As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens' operational guidelines for industrial security https://www.siemens.com/cert/operational-guidelines-industrial-security , and to follow the recommendations in the product manuals. Additional information on industrial security by Siemens can be found at the Siemens Industrial Security web page https://www.siemens.com/industrialsecurity . For further inquiries on security vulnerabilities in Siemens products and solutions, users should contact the Siemens ProductCERT https://www.siemens.com/cert/advisories .
Mon, 06 Jan 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-01-06T19:59:28.270Z
Reserved: 2023-03-29T22:59:38.901Z
Link: CVE-2023-1709

Updated: 2024-08-02T05:57:25.034Z

Status : Modified
Published: 2023-06-07T21:15:12.933
Modified: 2024-11-21T07:39:44.550
Link: CVE-2023-1709

No data.

No data.