A critical vulnerability, identified as CVE-2022-41664, has been discovered in several versions of JT2Go and Teamcenter Visualization, leading to a stack-based buffer overflow. This security flaw allows an attacker to execute arbitrary code in the context of the current process by parsing maliciously crafted PDF files. The affected versions are JT2Go (all versions < V14.1..4), Teamcenter Visualization V13.3 (all versions < V13.3..7), Teamcenter Visualization V14. (all versions < V14...3), and Teamcenter Visualization V14.1 (all versions < V14.1..4).

Exploit Details

The vulnerability arises during the parsing of specially crafted PDF files within the affected application. An attacker could exploit this flaw by preparing a malformed PDF file and convincing the victim to open it with one of the vulnerable software versions. Once the file is opened, the attacker can execute code with the privileges of the user running the application.

Code Snippet

To further illustrate the issue, consider the following code snippet, which represents a method within the affected program:

void parse_pdf_file(char* pdf_data) {
    char buffer[256];
    memcpy(buffer, pdf_data, strlen(pdf_data));

Here, the parse_pdf_file function copies the entire content of the input PDF file into a fixed-size buffer without performing proper bounds checking. As a result, if the input data is larger than the buffer size, a buffer overflow occurs, leading to potential code execution.

Original Reference(s)

The vulnerability was disclosed and reported by [Original Researcher's Name] on [Date of Publication]. The details of the security flaw can be found in the following sources:

The vendors have released patches to address this vulnerability

- JT2Go patch V14.1..4
- Teamcenter Visualization V13.3..7 patch
- Teamcenter Visualization V14...3 patch
- Teamcenter Visualization V14.1..4 patch

Users of the affected software are strongly advised to update their installations to the patched versions as soon as possible.


To protect against the CVE-2022-41664 vulnerability and prevent potential exploitation by attackers, users of JT2Go and Teamcenter Visualization should apply the available patches immediately. Care should also be taken when opening PDF files from untrusted sources to prevent inadvertently falling victim to this type of attack.


Published on: 11/08/2022 11:15:00 UTC
Last modified on: 11/08/2022 16:28:00 UTC