A vulnerability has been identified in Simcenter Femap 2020.2 (All versions < V2020.2.MP3), Simcenter Femap 2021.1 (All versions < V2021.1.MP3). The femap.exe application lacks proper validation of user-supplied data when parsing FEMAP files. This could result in an out of bounds write past the end of an allocated structure, a different vulnerability than CVE-2021-27387. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-12820)
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-133038.pdf | Patch Vendor Advisory |
https://www.zerodayinitiative.com/advisories/ZDI-21-781/ | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
History
02 Dec 2021, 13:50
Type | Values Removed | Values Added |
---|---|---|
References |
|
22 Jun 2021, 15:01
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:siemens:simcenter_femap:2020.2:-:*:*:*:*:*:* cpe:2.3:a:siemens:simcenter_femap:2021.1:maintenance_pack2:*:*:*:*:*:* cpe:2.3:a:siemens:simcenter_femap:2021.1:maintenance_pack1:*:*:*:*:*:* cpe:2.3:a:siemens:simcenter_femap:2020.2:maintenance_pack1:*:*:*:*:*:* cpe:2.3:a:siemens:simcenter_femap:2020.2:maintenance_pack2:*:*:*:*:*:* cpe:2.3:a:siemens:simcenter_femap:2021.1:-:*:*:*:*:*:* cpe:2.3:a:siemens:simcenter_femap:*:*:*:*:*:*:*:* |
|
References | (MISC) https://cert-portal.siemens.com/productcert/pdf/ssa-133038.pdf - Patch, Vendor Advisory | |
CWE | CWE-787 | |
CVSS |
v2 : v3 : |
v2 : 6.8
v3 : 7.8 |
08 Jun 2021, 21:30
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-06-08 20:15
Updated : 2023-12-10 13:55
NVD link : CVE-2021-27399
Mitre link : CVE-2021-27399
CVE.ORG link : CVE-2021-27399
JSON object : View
Products Affected
siemens
- simcenter_femap
CWE
CWE-787
Out-of-bounds Write