A vulnerability has been identified in JT2Go (All versions < V2406.0003). The affected application contains a stack-based buffer overflow vulnerability that could be triggered while parsing specially crafted PDF files. This could allow an attacker to execute code in the context of the current process.
Metrics
Affected Vendors & Products
References
History
Wed, 23 Oct 2024 14:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-787 |
Tue, 08 Oct 2024 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Siemens
Siemens jt2go |
|
CPEs | cpe:2.3:a:siemens:jt2go:*:*:*:*:*:*:*:* | |
Vendors & Products |
Siemens
Siemens jt2go |
|
Metrics |
ssvc
|
Tue, 08 Oct 2024 08:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability has been identified in JT2Go (All versions < V2406.0003). The affected application contains a stack-based buffer overflow vulnerability that could be triggered while parsing specially crafted PDF files. This could allow an attacker to execute code in the context of the current process. | |
Weaknesses | CWE-121 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: siemens
Published: 2024-10-08T08:40:18.170Z
Updated: 2024-10-08T18:03:27.584Z
Reserved: 2024-07-23T10:56:51.267Z
Link: CVE-2024-41902
Vulnrichment
Updated: 2024-10-08T18:03:19.079Z
NVD
Status : Analyzed
Published: 2024-10-08T09:15:11.453
Modified: 2024-10-23T14:16:24.277
Link: CVE-2024-41902
Redhat
No data.