Stack-based buffer overflow vulnerability in JT2Go could allow code execution

CVE-2024-41902

7.8HIGH

Key Information

Vendor
Siemens
Status
Jt2go
Vendor
CVE Published:
8 October 2024

Summary

A vulnerability has been identified in JT2Go (All versions < V2406.0003). The affected application contains a stack-based buffer overflow vulnerability that could be triggered while parsing specially crafted PDF files. This could allow an attacker to execute code in the context of the current process.

Affected Version(s)

JT2Go < 0

Refferences

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Collectors

NVD DatabaseMitre Database
.