The APDFL.dll contains a stack-based buffer overflow vulnerability that could be triggered while parsing specially crafted PDF files. This could allow an attacker to execute code in the context of the current process.
Solution:
Workaround:
A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-22-349-15 | third party advisory us government resource |
https://cert-portal.siemens.com/productcert/html/ssa-360681.html | third party advisory patch |
https://cert-portal.siemens.com/productcert/csaf/ssa-360681.json | third party advisory |