ID

VAR-202112-0806


CVE

CVE-2021-44003


TITLE

JT2Go  and  Teamcenter Visualization  Vulnerability in using uninitialized variables in

Trust: 0.8

sources: JVNDB: JVNDB-2021-010935

DESCRIPTION

A vulnerability has been identified in JT2Go (All versions < V13.2.0.5), Teamcenter Visualization (All versions < V13.2.0.5). The Tiff_Loader.dll is vulnerable to use of uninitialized memory while parsing user supplied TIFF files. This could allow an attacker to cause a denial-of-service condition. JT2Go and Teamcenter Visualization Exists in the use of uninitialized variables.Service operation interruption (DoS) It may be put into a state

Trust: 1.62

sources: NVD: CVE-2021-44003 // JVNDB: JVNDB-2021-010935

AFFECTED PRODUCTS

vendor:siemensmodel:jt2goscope:ltversion:13.2.0.5

Trust: 1.0

vendor:siemensmodel:teamcenter visualizationscope:ltversion:13.2.0.5

Trust: 1.0

vendor:シーメンスmodel:jt2goscope: - version: -

Trust: 0.8

vendor:シーメンスmodel:teamcenter visualizationscope:eqversion:13.2.0.5

Trust: 0.8

sources: JVNDB: JVNDB-2021-010935 // NVD: CVE-2021-44003

CVSS

SEVERITY

CVSSV2

CVSSV3

NVD: CVE-2021-44003
value: MEDIUM

Trust: 1.8

CNNVD: CNNVD-202112-1194
value: MEDIUM

Trust: 0.6

NVD:
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: FALSE
obtainAllPrivilege: FALSE
obtainUserPrivilege: FALSE
obtainOtherPrivilege: FALSE
userInteractionRequired: TRUE
version: 2.0

Trust: 1.0

NVD: CVE-2021-44003
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

NVD:
baseSeverity: MEDIUM
baseScore: 5.5
vectorString: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2021-44003
baseSeverity: MEDIUM
baseScore: 5.5
vectorString: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2021-010935 // NVD: CVE-2021-44003 // CNNVD: CNNVD-202112-1194

PROBLEMTYPE DATA

problemtype:CWE-908

Trust: 1.0

problemtype:Use of uninitialized variables (CWE-457) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2021-010935 // NVD: CVE-2021-44003

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202112-1194

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202112-1194

CONFIGURATIONS

sources: NVD: CVE-2021-44003

PATCH

title:SSA-595101url:https://cert-portal.siemens.com/productcert/pdf/ssa-595101.pdf

Trust: 0.8

title:Siemens Jt2go Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=175268

Trust: 0.6

sources: JVNDB: JVNDB-2021-010935 // CNNVD: CNNVD-202112-1194

EXTERNAL IDS

db:NVDid:CVE-2021-44003

Trust: 3.2

db:SIEMENSid:SSA-595101

Trust: 1.6

db:JVNid:JVNVU96592426

Trust: 0.8

db:JVNDBid:JVNDB-2021-010935

Trust: 0.8

db:AUSCERTid:ESB-2021.4300

Trust: 0.6

db:ICS CERTid:ICSA-21-350-10

Trust: 0.6

db:CS-HELPid:SB2022010614

Trust: 0.6

db:CNNVDid:CNNVD-202112-1194

Trust: 0.6

sources: JVNDB: JVNDB-2021-010935 // NVD: CVE-2021-44003 // CNNVD: CNNVD-202112-1194

REFERENCES

url:https://cert-portal.siemens.com/productcert/pdf/ssa-595101.pdf

Trust: 1.6

url:https://nvd.nist.gov/vuln/detail/cve-2021-44003

Trust: 1.4

url:https://jvn.jp/vu/jvnvu96592426/

Trust: 0.8

url:https://us-cert.cisa.gov/ics/advisories/icsa-21-350-10

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.4300

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022010614

Trust: 0.6

sources: JVNDB: JVNDB-2021-010935 // NVD: CVE-2021-44003 // CNNVD: CNNVD-202112-1194

CREDITS

Mat Powell of Trend Micro’s Zero Day Initiative and Jin Huang from ADLab reported these vulnerabilities.

Trust: 0.6

sources: CNNVD: CNNVD-202112-1194

SOURCES

db:JVNDBid:JVNDB-2021-010935
db:NVDid:CVE-2021-44003
db:CNNVDid:CNNVD-202112-1194

LAST UPDATE DATE

2023-12-18T11:28:55.669000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2021-010935date:2022-07-12T07:03:00
db:NVDid:CVE-2021-44003date:2022-07-25T10:38:59.030
db:CNNVDid:CNNVD-202112-1194date:2022-07-26T00:00:00

SOURCES RELEASE DATE

db:JVNDBid:JVNDB-2021-010935date:2022-07-12T00:00:00
db:NVDid:CVE-2021-44003date:2021-12-14T12:15:10.197
db:CNNVDid:CNNVD-202112-1194date:2021-12-14T00:00:00