Datalogics Library APDFLThe v18.0.4PlusP1e and prior contains a stack-based buffer overflow due to documents containing corrupted fonts, which could allow an attack that causes an unhandled crash during the rendering process.



Advisories
Source ID Title
EUVD EUVD EUVD-2023-23933 Datalogics Library APDFLThe v18.0.4PlusP1e and prior contains a stack-based buffer overflow due to documents containing corrupted fonts, which could allow an attack that causes an unhandled crash during the rendering process.
Fixes

Solution

Siemens has released updates for the affected products and recommends updating to the latest versions: * JT2Go: Update to V14.2.0.2 https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html or later version * Teamcenter Visualization V13.2: Update to V13.2.0.13 https://support.sw.siemens.com/   or later version * Teamcenter Visualization V13.3: Update to V13.3.0.9 https://support.sw.siemens.com/   or later version * Teamcenter Visualization V14.0: Update to V14.0.0.5 https://support.sw.siemens.com/   or later version * Teamcenter Visualization V14.1: Update to V14.1.0.7 https://support.sw.siemens.com/   or later version * Teamcenter Visualization V14.2: Update to V14.2.0.2 https://support.sw.siemens.com/   or later version


Workaround

Siemens has identified the following specific workarounds and mitigations that users can apply to reduce risks: * Avoid opening untrusted files in JT2Go and Teamcenter Visualization As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens' operational guidelines for industrial security https://www.siemens.com/cert/operational-guidelines-industrial-security , and to follow the recommendations in the product manuals. Additional information on industrial security by Siemens can be found at the Siemens Industrial Security web page https://www.siemens.com/industrialsecurity . For further inquiries on security vulnerabilities in Siemens products and solutions, users should contact the Siemens ProductCERT https://www.siemens.com/cert/advisories .

History

Mon, 06 Jan 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-01-06T19:59:28.270Z

Reserved: 2023-03-29T22:59:38.901Z

Link: CVE-2023-1709

cve-icon Vulnrichment

Updated: 2024-08-02T05:57:25.034Z

cve-icon NVD

Status : Modified

Published: 2023-06-07T21:15:12.933

Modified: 2024-11-21T07:39:44.550

Link: CVE-2023-1709

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.