SB2022091446 - Multiple vulnerabilities in Siemens Simcenter Femap and Parasolid
Published: September 14, 2022 Updated: September 18, 2022
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 15 secuirty vulnerabilities.
1) Out-of-bounds write (CVE-ID: CVE-2022-39152)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error while parsing specially crafted X_T files. A remote attacker can create a specially crafted file, trick the victim into opening it using the affected software, trigger out-of-bounds write and execute arbitrary code on the target system.
2) Out-of-bounds write (CVE-ID: CVE-2022-39156)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error while parsing specially crafted X_T files. A remote attacker can create a specially crafted file, trick the victim into opening it using the affected software, trigger out-of-bounds write and execute arbitrary code on the target system.
3) Out-of-bounds write (CVE-ID: CVE-2022-39155)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error while parsing specially crafted X_T files. A remote attacker can create a specially crafted file, trick the victim into opening it using the affected software, trigger out-of-bounds write and execute arbitrary code on the target system.
4) Out-of-bounds write (CVE-ID: CVE-2022-39154)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error while parsing specially crafted X_T files. A remote attacker can create a specially crafted file, trick the victim into opening it using the affected software, trigger out-of-bounds write and execute arbitrary code on the target system.
5) Out-of-bounds write (CVE-ID: CVE-2022-39153)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error while parsing specially crafted X_T files. A remote attacker can create a specially crafted file, trick the victim into opening it using the affected software, trigger out-of-bounds write and execute arbitrary code on the target system.
6) Out-of-bounds write (CVE-ID: CVE-2022-39151)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error while parsing specially crafted X_T files. A remote attacker can create a specially crafted file, trick the victim into opening it using the affected software, trigger out-of-bounds write and execute arbitrary code on the target system.
7) Out-of-bounds write (CVE-ID: CVE-2022-39150)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error while parsing specially crafted X_T files. A remote attacker can create a specially crafted file, trick the victim into opening it using the affected software, trigger out-of-bounds write and execute arbitrary code on the target system.
8) Out-of-bounds write (CVE-ID: CVE-2022-39149)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error while parsing specially crafted X_T files. A remote attacker can create a specially crafted file, trick the victim into opening it using the affected software, trigger out-of-bounds write and execute arbitrary code on the target system.
9) Out-of-bounds write (CVE-ID: CVE-2022-39148)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error while parsing specially crafted X_T files. A remote attacker can create a specially crafted file, trick the victim into opening it using the affected software, trigger out-of-bounds write and execute arbitrary code on the target system.
10) Access of Uninitialized Pointer (CVE-ID: CVE-2022-39147)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to uninitialized pointer access while parsing specially crafted X_T files. A remote attacker can trick a victim to open a specially crafted file and execute arbitrary code on the target system.
11) Access of Uninitialized Pointer (CVE-ID: CVE-2022-39146)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to uninitialized pointer access while parsing specially crafted X_T files. A remote attacker can trick a victim to open a specially crafted file and execute arbitrary code on the target system.
12) Out-of-bounds write (CVE-ID: CVE-2022-39145)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error while parsing specially crafted X_T files. A remote attacker can create a specially crafted file, trick the victim into opening it using the affected software, trigger out-of-bounds write and execute arbitrary code on the target system.
13) Out-of-bounds write (CVE-ID: CVE-2022-39144)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error while parsing specially crafted X_T files. A remote attacker can create a specially crafted file, trick the victim into opening it using the affected software, trigger out-of-bounds write and execute arbitrary code on the target system.
14) Out-of-bounds write (CVE-ID: CVE-2022-39143)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error while parsing specially crafted X_T files. A remote attacker can create a specially crafted file, trick the victim into opening it using the affected software, trigger out-of-bounds write and execute arbitrary code on the target system.
15) Out-of-bounds write (CVE-ID: CVE-2022-39142)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error while parsing specially crafted X_T files. A remote attacker can create a specially crafted file, trick the victim into opening it using the affected software, trigger out-of-bounds write and execute arbitrary code on the target system.
Remediation
Install update from vendor's website.
References
- https://cert-portal.siemens.com/productcert/txt/ssa-518824.txt
- https://www.zerodayinitiative.com/advisories/ZDI-22-1245/
- https://www.zerodayinitiative.com/advisories/ZDI-22-1249/
- https://www.zerodayinitiative.com/advisories/ZDI-22-1248/
- https://www.zerodayinitiative.com/advisories/ZDI-22-1247/
- https://www.zerodayinitiative.com/advisories/ZDI-22-1246/
- https://www.zerodayinitiative.com/advisories/ZDI-22-1244/
- https://www.zerodayinitiative.com/advisories/ZDI-22-1243/
- https://www.zerodayinitiative.com/advisories/ZDI-22-1242/
- https://www.zerodayinitiative.com/advisories/ZDI-22-1241/
- https://www.zerodayinitiative.com/advisories/ZDI-22-1240/
- https://www.zerodayinitiative.com/advisories/ZDI-22-1239/
- https://www.zerodayinitiative.com/advisories/ZDI-22-1238/
- https://www.zerodayinitiative.com/advisories/ZDI-22-1237/
- https://www.zerodayinitiative.com/advisories/ZDI-22-1236/
- https://www.zerodayinitiative.com/advisories/ZDI-22-1235/