A vulnerability has been identified in Solid Edge SE2020 (All versions < SE2020MP13), Solid Edge SE2021 (All Versions < SE2021MP4). Affected applications lack proper validation of user-supplied data when parsing PAR files. This could result in an out of bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-12532)
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-574442.pdf | Patch Vendor Advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-715184.pdf | Patch Vendor Advisory |
https://us-cert.cisa.gov/ics/advisories/icsa-21-103-06 | Third Party Advisory US Government Resource |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: siemens
Published: 2021-03-15T17:03:31
Updated: 2021-06-08T19:47:16
Reserved: 2021-02-18T00:00:00
Link: CVE-2021-27380
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-03-15T17:15:22.207
Modified: 2021-12-10T21:32:06.170
Link: CVE-2021-27380
JSON object: View
Redhat Information
No data.
CWE