The APDFL.dll contains a stack-based buffer overflow vulnerability that
could be triggered while parsing specially crafted PDF files. This could
allow an attacker to execute code in the context of the current
process.
References
| Link | Resource |
|---|---|
| https://cert-portal.siemens.com/productcert/csaf/ssa-360681.json | Third Party Advisory |
| https://cert-portal.siemens.com/productcert/html/ssa-360681.html | Patch Third Party Advisory |
| https://www.cisa.gov/uscert/ics/advisories/icsa-22-349-15 | Third Party Advisory US Government Resource |
| https://cert-portal.siemens.com/productcert/csaf/ssa-360681.json | Third Party Advisory |
| https://cert-portal.siemens.com/productcert/html/ssa-360681.html | Patch Third Party Advisory |
| https://www.cisa.gov/uscert/ics/advisories/icsa-22-349-15 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:18
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2023-01-13 01:15
Updated : 2024-11-21 07:18
NVD link : CVE-2022-3159
Mitre link : CVE-2022-3159
CVE.ORG link : CVE-2022-3159
JSON object : View
Products Affected
siemens
- jt2go
- teamcenter_visualization
