A vulnerability has been identified in Solid Edge (All Versions < SE2022MP9). The affected application contains an out of bounds write past the fixed-length heap-based buffer while parsing specially crafted DWG files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-17627)
A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().
Name | Vendor | Start Version | End Version |
---|---|---|---|
Solid_edge | Siemens | se2020 (including) | se2020 (including) |
Solid_edge | Siemens | se2020-maintenance_pack1 (including) | se2020-maintenance_pack1 (including) |
Solid_edge | Siemens | se2020-maintenance_pack2 (including) | se2020-maintenance_pack2 (including) |
Solid_edge | Siemens | se2020-maintenance_pack3 (including) | se2020-maintenance_pack3 (including) |
Solid_edge | Siemens | se2020-maintenance_pack4 (including) | se2020-maintenance_pack4 (including) |
Solid_edge | Siemens | se2020-maintenance_pack5 (including) | se2020-maintenance_pack5 (including) |
Solid_edge | Siemens | se2020-maintenance_pack6 (including) | se2020-maintenance_pack6 (including) |
Solid_edge | Siemens | se2020-maintenance_pack7 (including) | se2020-maintenance_pack7 (including) |
Solid_edge | Siemens | se2020-maintenance_pack8 (including) | se2020-maintenance_pack8 (including) |