Stack-based buffer overflow vulnerability in JT2Go could allow code execution
CVE-2024-41902

7.8HIGH

Key Information:

Vendor
Siemens
Status
Vendor
CVE Published:
8 October 2024

Summary

A vulnerability has been identified in JT2Go, specifically in all versions prior to V2406.0003. This flaw is a stack-based buffer overflow that can be triggered when the application processes specially crafted PDF files. If successfully exploited, this vulnerability may enable an attacker to execute arbitrary code in the context of the current process, posing a significant risk to users of the affected versions of JT2Go.

Affected Version(s)

JT2Go 0

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.