A vulnerability has been identified in JT2Go (All versions < V2406.0003). The affected application contains a stack-based buffer overflow vulnerability that could be triggered while parsing specially crafted PDF files. This could allow an attacker to execute code in the context of the current process.
History

Wed, 23 Oct 2024 14:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-787

Tue, 08 Oct 2024 18:15:00 +0000

Type Values Removed Values Added
First Time appeared Siemens
Siemens jt2go
CPEs cpe:2.3:a:siemens:jt2go:*:*:*:*:*:*:*:*
Vendors & Products Siemens
Siemens jt2go
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 08 Oct 2024 08:45:00 +0000

Type Values Removed Values Added
Description A vulnerability has been identified in JT2Go (All versions < V2406.0003). The affected application contains a stack-based buffer overflow vulnerability that could be triggered while parsing specially crafted PDF files. This could allow an attacker to execute code in the context of the current process.
Weaknesses CWE-121
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 7.3, 'vector': 'CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: siemens

Published: 2024-10-08T08:40:18.170Z

Updated: 2024-10-08T18:03:27.584Z

Reserved: 2024-07-23T10:56:51.267Z

Link: CVE-2024-41902

cve-icon Vulnrichment

Updated: 2024-10-08T18:03:19.079Z

cve-icon NVD

Status : Analyzed

Published: 2024-10-08T09:15:11.453

Modified: 2024-10-23T14:16:24.277

Link: CVE-2024-41902

cve-icon Redhat

No data.