A vulnerability has been identified in Solid Edge SE2023 (All versions < V223.0 Update 10). The affected applications contain a stack overflow vulnerability while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process.
A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
Name | Vendor | Start Version | End Version |
---|---|---|---|
Solid_edge_se2023 | Siemens | * | 223.0 (excluding) |
Solid_edge_se2023 | Siemens | 223.0 (including) | 223.0 (including) |
Solid_edge_se2023 | Siemens | 223.0-update_0001 (including) | 223.0-update_0001 (including) |
Solid_edge_se2023 | Siemens | 223.0-update_0002 (including) | 223.0-update_0002 (including) |
Solid_edge_se2023 | Siemens | 223.0-update_0003 (including) | 223.0-update_0003 (including) |
Solid_edge_se2023 | Siemens | 223.0-update_0004 (including) | 223.0-update_0004 (including) |
Solid_edge_se2023 | Siemens | 223.0-update_0005 (including) | 223.0-update_0005 (including) |
Solid_edge_se2023 | Siemens | 223.0-update_0006 (including) | 223.0-update_0006 (including) |
Solid_edge_se2023 | Siemens | 223.0-update_0007 (including) | 223.0-update_0007 (including) |
Solid_edge_se2023 | Siemens | 223.0-update_0008 (including) | 223.0-update_0008 (including) |
Solid_edge_se2023 | Siemens | 223.0-update_0009 (including) | 223.0-update_0009 (including) |