The APDFL.dll contains a stack-based buffer overflow vulnerability that
could be triggered while parsing specially crafted PDF files. This could
allow an attacker to execute code in the context of the current
process.
References
| Link | Resource |
|---|---|
| https://cert-portal.siemens.com/productcert/csaf/ssa-360681.json | Third Party Advisory |
| https://cert-portal.siemens.com/productcert/html/ssa-360681.html | Patch Third Party Advisory |
| https://www.cisa.gov/uscert/ics/advisories/icsa-22-349-15 | Third Party Advisory US Government Resource |
| https://cert-portal.siemens.com/productcert/csaf/ssa-360681.json | Third Party Advisory |
| https://cert-portal.siemens.com/productcert/html/ssa-360681.html | Patch Third Party Advisory |
| https://www.cisa.gov/uscert/ics/advisories/icsa-22-349-15 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:18
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://cert-portal.siemens.com/productcert/csaf/ssa-360681.json - Third Party Advisory | |
| References | () https://cert-portal.siemens.com/productcert/html/ssa-360681.html - Patch, Third Party Advisory | |
| References | () https://www.cisa.gov/uscert/ics/advisories/icsa-22-349-15 - Third Party Advisory, US Government Resource |
07 Nov 2023, 03:50
| Type | Values Removed | Values Added |
|---|---|---|
| Summary | The APDFL.dll contains a stack-based buffer overflow vulnerability that could be triggered while parsing specially crafted PDF files. This could allow an attacker to execute code in the context of the current process. |
Information
Published : 2023-01-13 01:15
Updated : 2024-11-21 07:18
NVD link : CVE-2022-3159
Mitre link : CVE-2022-3159
CVE.ORG link : CVE-2022-3159
JSON object : View
Products Affected
siemens
- jt2go
- teamcenter_visualization
