Headline
CVE-2021-44003
A vulnerability has been identified in JT2Go (All versions < V13.2.0.5), Teamcenter Visualization (All versions < V13.2.0.5). The Tiff_Loader.dll is vulnerable to use of uninitialized memory while parsing user supplied TIFF files. This could allow an attacker to cause a denial-of-service condition.
%PDF-1.5 %���� 1 0 obj << /D [2 0 R /XYZ 70.866 771.024 null] >> endobj 3 0 obj << /D [2 0 R /XYZ 70.866 630.026 null] >> endobj 4 0 obj << /D [2 0 R /XYZ 70.866 546.036 null] >> endobj 5 0 obj << /D [2 0 R /XYZ 70.866 343.258 null] >> endobj 6 0 obj << /D [2 0 R /XYZ 70.866 272.22 null] >> endobj 7 0 obj << /D [8 0 R /XYZ 85.039 580.173 null] >> endobj 9 0 obj << /D [8 0 R /XYZ 70.866 253.063 null] >> endobj 10 0 obj << /S /GoTo /D [2 0 R /Fit] >> endobj 2 0 obj << /Contents 11 0 R /Type /Page /Resources 12 0 R /Parent 13 0 R /Annots [14 0 R 15 0 R 16 0 R 17 0 R 18 0 R 19 0 R 20 0 R 21 0 R] /MediaBox [0 0 595.276 841.89] >> endobj 14 0 obj << /A << /S /URI /Type /Action /URI (https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html) >> /C [0 1 1] /Subtype /Link /Type /Annot /H /I /Border [0 0 0] /Rect [303.117 446.564 518.276 457.981] >> endobj 16 0 obj << /A << /S /GoTo /D (section*.3) >> /Subtype /Link /C [1 0 0] /Type /Annot /H /I /Border [0 0 0] /Rect [302.649 409.209 433.497 421.886] >> endobj 17 0 obj << /A << /S /URI /Type /Action /URI (https://support.sw.siemens.com/) >> /C [0 1 1] /Subtype /Link /Type /Annot /H /I /Border [0 0 0] /Rect [303.117 380.613 446.757 392.03] >> endobj 18 0 obj << /A << /S /GoTo /D (section*.3) >> /Subtype /Link /C [1 0 0] /Type /Annot /H /I /Border [0 0 0] /Rect [302.649 355.214 433.497 367.891] >> endobj 19 0 obj << /A << /S /URI /Type /Action /URI (https://www.siemens.com/cert/operational-guidelines-industrial-security) >> /C [0 1 1] /Subtype /Link /Type /Annot /H /I /Border [0 0 0] /Rect [164.798 180.148 487.754 191.684] >> endobj 20 0 obj << /A << /S /URI /Type /Action /URI (https://www.siemens.com/industrialsecurity) >> /C [0 1 1] /Subtype /Link /Type /Annot /H /I /Border [0 0 0] /Rect [406.699 150.379 525.406 161.797] >> endobj 12 0 obj << /ProcSet [/PDF /Text] /Font << /F52 22 0 R /F49 23 0 R >> >> endobj 11 0 obj << /Filter /FlateDecode /Length 3120 >> stream xڽZ[s۸~���[���&n��ח��8qm9�m��D�l(Q�x�_���,R4͌6}�E�����@0��wG�L��/d4��(��`�0о�@G���Lf�/��4Y$�b4�:�&��z4fj�������[Z���Mݏ�����z��6����f�Փѿ&��’G�9b@��g��LG_��fx�~�{" Of�b ��x��G?�Q�o &��U��!�J/�r��G�^$��e��<��A�’c)泷�1�<���p����w@��}`�’��2Q��j���*K���{<�}��P��υ��> ��ڱ.��`g���Eڊ:8��� ��i���y>㝨湎�5�A����t9ߧB@-���B@����@@ð� ��b��S�y��M�L��}��e���H�=��!�HxL���^��.J���H�-���S*8q�aF�l@ /܁ц8�)�a�’�]ނ{��;���i���0������Yk$0^[`�T]�j ���xm gk���&�b�,�d��e����� (e��S���"D���40�=�:��bg��2�[4��S���%[$z����N�%`B�: �����͇��D@�=я��T_��j��{����C֘��p��"�ta`cR�,�ZI�d�,.��H�Bɇ��l���I:�njtK��⢴{�V3�Ki�^�u�Y���v��QsX8�%����}�oo��o��闸H\�7�$Bj���E����� �kQ(� |6�@ ��|�����f���otx����z�0r�ؽ�e���cl��:�P8���F