An issue was discovered in Open Design Alliance Drawings SDK before 2021.11. A stack-based buffer overflow vulnerability exists when the recover operation is run with malformed .DXF and .DWG files. This can allow attackers to cause a crash potentially enabling a denial of service attack (Crash, Exit, or Restart) or possible code execution.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-155599.pdf | Patch Third Party Advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-663999.pdf | Patch Third Party Advisory |
https://www.opendesign.com/security-advisories | Vendor Advisory |
https://www.zerodayinitiative.com/advisories/ZDI-21-220/ | Third Party Advisory VDB Entry |
https://www.zerodayinitiative.com/advisories/ZDI-21-240/ | Third Party Advisory VDB Entry |
https://www.zerodayinitiative.com/advisories/ZDI-21-243/ | Third Party Advisory VDB Entry |
Configurations
History
08 Apr 2022, 13:23
Type | Values Removed | Values Added |
---|---|---|
First Time |
Siemens comos
|
|
CPE | cpe:2.3:a:siemens:comos:*:*:*:*:*:*:*:* | |
References | (CONFIRM) https://cert-portal.siemens.com/productcert/pdf/ssa-155599.pdf - Patch, Third Party Advisory | |
References | (CONFIRM) https://cert-portal.siemens.com/productcert/pdf/ssa-663999.pdf - Patch, Third Party Advisory |
10 Mar 2022, 17:41
Type | Values Removed | Values Added |
---|---|---|
References |
|
04 Mar 2021, 16:37
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://www.zerodayinitiative.com/advisories/ZDI-21-240/ - Third Party Advisory, VDB Entry | |
References | (MISC) https://www.zerodayinitiative.com/advisories/ZDI-21-243/ - Third Party Advisory, VDB Entry | |
References | (MISC) https://www.zerodayinitiative.com/advisories/ZDI-21-220/ - Third Party Advisory, VDB Entry |
24 Feb 2021, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
23 Feb 2021, 14:34
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:siemens:jt2go:*:*:*:*:*:*:*:* cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:* |
|
References | (CONFIRM) https://cert-portal.siemens.com/productcert/pdf/ssa-663999.pdf - Third Party Advisory |
09 Feb 2021, 14:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
22 Jan 2021, 21:51
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:opendesign:drawings_software_development_kit:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : 6.8
v3 : 7.8 |
References | (MISC) https://www.opendesign.com/security-advisories - Vendor Advisory | |
CWE | CWE-787 |
18 Jan 2021, 08:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-01-18 08:15
Updated : 2023-12-10 13:41
NVD link : CVE-2021-25178
Mitre link : CVE-2021-25178
CVE.ORG link : CVE-2021-25178
JSON object : View
Products Affected
siemens
- jt2go
- comos
- teamcenter_visualization
opendesign
- drawings_software_development_kit
CWE
CWE-787
Out-of-bounds Write