Siemens JT2Go < 2406.0003 Buffer Overflow (SSA-626178)

high Nessus Plugin ID 208732

Synopsis

The remote host is missing one or more security updates.

Description

The version of Siemens JT2Go installed on the remote host is prior to 2406.0003. It is, therefore, affected by a stack-based buffer overflow vulnerability as referenced in the SSA-626178 advisory that could be triggered while parsing specially crafted PDF files. This could allow an attacker to execute code in the context of the current process.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade to JT2Go 15.0.x with Copyright Version 2406.0003 or higher.

See Also

https://cert-portal.siemens.com/productcert/html/ssa-626178.html

Plugin Details

Severity: High

ID: 208732

File Name: siemens_jt2go_SSA-626178.nasl

Version: 1.2

Type: local

Agent: windows

Family: Windows

Published: 10/11/2024

Updated: 10/14/2024

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 5.3

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2024-41902

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.8

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

CVSS v4

Risk Factor: High

Base Score: 7.3

Threat Score: 4.4

Threat Vector: CVSS:4.0/E:U

Vector: CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Vulnerability Information

CPE: x-cpe:/a:siemens:jt2go

Required KB Items: installed_sw/Siemens JT2Go

Exploit Ease: No known exploits are available

Patch Publication Date: 10/8/2023

Vulnerability Publication Date: 10/8/2024

Reference Information

CVE: CVE-2024-41902

IAVA: 2024-A-0637