An issue was discovered in Open Design Alliance Drawings SDK before 2021.11. A stack-based buffer overflow vulnerability exists when the recover operation is run with malformed .DXF and .DWG files. This can allow attackers to cause a crash potentially enabling a denial of service attack (Crash, Exit, or Restart) or possible code execution.
References
Link | Resource |
---|---|
https://www.opendesign.com/security-advisories | Vendor Advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-663999.pdf | Patch Third Party Advisory |
https://www.zerodayinitiative.com/advisories/ZDI-21-240/ | Third Party Advisory VDB Entry |
https://www.zerodayinitiative.com/advisories/ZDI-21-243/ | Third Party Advisory VDB Entry |
https://www.zerodayinitiative.com/advisories/ZDI-21-220/ | Third Party Advisory VDB Entry |
https://cert-portal.siemens.com/productcert/pdf/ssa-155599.pdf | Patch Third Party Advisory |
Information
Published : 2021-01-18 00:15
Updated : 2022-04-08 06:23
NVD link : CVE-2021-25178
Mitre link : CVE-2021-25178
JSON object : View
CWE
CWE-787
Out-of-bounds Write
Products Affected
siemens
- teamcenter_visualization
- comos
- jt2go
opendesign
- drawings_software_development_kit