A vulnerability has been identified in Solid Edge SE2023 (All versions < V223.0 Update 10). The affected application is vulnerable to heap-based buffer overflow while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process.
A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().
Name | Vendor | Start Version | End Version |
---|---|---|---|
Solid_edge_se2023 | Siemens | * | 223.0 (excluding) |
Solid_edge_se2023 | Siemens | 223.0 (including) | 223.0 (including) |
Solid_edge_se2023 | Siemens | 223.0-update_0001 (including) | 223.0-update_0001 (including) |
Solid_edge_se2023 | Siemens | 223.0-update_0002 (including) | 223.0-update_0002 (including) |
Solid_edge_se2023 | Siemens | 223.0-update_0003 (including) | 223.0-update_0003 (including) |
Solid_edge_se2023 | Siemens | 223.0-update_0004 (including) | 223.0-update_0004 (including) |
Solid_edge_se2023 | Siemens | 223.0-update_0005 (including) | 223.0-update_0005 (including) |
Solid_edge_se2023 | Siemens | 223.0-update_0006 (including) | 223.0-update_0006 (including) |
Solid_edge_se2023 | Siemens | 223.0-update_0007 (including) | 223.0-update_0007 (including) |
Solid_edge_se2023 | Siemens | 223.0-update_0008 (including) | 223.0-update_0008 (including) |
Solid_edge_se2023 | Siemens | 223.0-update_0009 (including) | 223.0-update_0009 (including) |