Headline
CVE-2022-29033
A vulnerability has been identified in JT2Go (All versions < V13.3.0.3), Teamcenter Visualization V13.3 (All versions < V13.3.0.3), Teamcenter Visualization V14.0 (All versions < V14.0.0.1). The CGM_NIST_Loader.dll library is vulnerable to uninitialized pointer free while parsing specially crafted CGM files. An attacker could leverage this vulnerability to execute code in the context of the current process.
%PDF-1.5 %���� 1 0 obj << /D [2 0 R /XYZ 70.866 771.024 null] >> endobj 3 0 obj << /D [2 0 R /XYZ 70.866 630.026 null] >> endobj 4 0 obj << /D [2 0 R /XYZ 70.866 546.036 null] >> endobj 5 0 obj << /D [2 0 R /XYZ 70.866 289.263 null] >> endobj 6 0 obj << /D [2 0 R /XYZ 70.866 182.359 null] >> endobj 7 0 obj << /D [8 0 R /XYZ 85.039 335.973 null] >> endobj 9 0 obj << /D [10 0 R /XYZ 70.866 649.338 null] >> endobj 11 0 obj << /S /GoTo /D [2 0 R /Fit] >> endobj 2 0 obj << /Contents 12 0 R /Type /Page /Resources 13 0 R /Parent 14 0 R /Annots [15 0 R 16 0 R 17 0 R 18 0 R 19 0 R 20 0 R 21 0 R 22 0 R 23 0 R] /MediaBox [0 0 595.276 841.89] >> endobj 15 0 obj << /A << /S /URI /Type /Action /URI (https://www.plm.automation.siemens.com/global/en/products/plm-components/jt2go.html) >> /C [0 1 1] /Subtype /Link /Type /Annot /H /I /Border [0 0 0] /Rect [303.117 446.564 518.276 457.981] >> endobj 17 0 obj << /A << /S /GoTo /D (section*.3) >> /Subtype /Link /C [1 0 0] /Type /Annot /H /I /Border [0 0 0] /Rect [302.649 409.209 433.497 421.886] >> endobj 18 0 obj << /A << /S /URI /Type /Action /URI (https://support.sw.siemens.com/) >> /C [0 1 1] /Subtype /Link /Type /Annot /H /I /Border [0 0 0] /Rect [303.117 380.613 446.757 392.03] >> endobj 19 0 obj << /A << /S /GoTo /D (section*.3) >> /Subtype /Link /C [1 0 0] /Type /Annot /H /I /Border [0 0 0] /Rect [302.649 355.214 433.497 367.891] >> endobj 20 0 obj << /A << /S /URI /Type /Action /URI (https://support.sw.siemens.com/) >> /C [0 1 1] /Subtype /Link /Type /Annot /H /I /Border [0 0 0] /Rect [303.117 326.618 446.757 338.035] >> endobj 21 0 obj << /A << /S /GoTo /D (section*.3) >> /Subtype /Link /C [1 0 0] /Type /Annot /H /I /Border [0 0 0] /Rect [302.649 301.218 433.497 313.895] >> endobj 22 0 obj << /A << /S /GoTo /D (section*.2) >> /Subtype /Link /C [1 0 0] /Type /Annot /H /I /Border [0 0 0] /Rect [386.143 199.176 524.579 210.712] >> endobj 23 0 obj << /A << /S /GoTo /D (section*.4) >> /Subtype /Link /C [1 0 0] /Type /Annot /H /I /Border [0 0 0] /Rect [147.498 181.363 309.548 192.78] >> endobj 13 0 obj << /ProcSet [/PDF /Text] /Font << /F51 24 0 R /F48 25 0 R >> >> endobj 12 0 obj << /Filter /FlateDecode /Length 2434 >> stream x��ZYs�F~ׯ�#X�极+/�l��l�D)�r����5HpqXq~�� �����rY3=�=_���2;:>�:�P$�f���HK�(B��`�>��i�LV�dJ���y]L�D�i�� �,��e��~�nB7ם�E����黫 ̞M��}8z7;���p@�� �ˣ��`�>�HOv�2��!�\g��ѿ������4�)!�t���(R|C��G��0q�� "R{]�L�`X�7�!�c6’�9���[$$��bch�NȰ��&�+�E�U�:K�٧�"*���=�S�A�d �vd�}���t�?K{Y�c�b]2��(�A��A֥��~i� .&`Pe�zؗ�,(����F��"�zH Fb�w���H��*)�4K�4)�%�D!.�!�p*�P�U4$�!Ƣ��HW=�3���1���(���>Ɓ��;6�aF���#p~�0�!���+��ҁ�ܵ�x���k3���ЮJ��$c�6g.�n:3�M��