vendor:
FontForge
by:
SecurityFocus
7,5
CVSS
HIGH
Stack-Based Buffer Overflow
119
CWE
Product Name: FontForge
Affected Version From: FontForge 0.0.20100501-2
Affected Version To: FontForge 0.0.20100501-2
Patch Exists: Yes
Related CWE: N/A
CPE: a:fontforge:fontforge
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2010
FontForge Stack-Based Buffer Overflow Vulnerability
FontForge is prone to a stack-based buffer-overflow vulnerability because the application fails to properly bounds-check user-supplied data before copying it into an insufficiently sized buffer. An attacker could exploit this issue to execute arbitrary code in the context of the affected application. Failed exploit attempts will likely result in denial-of-service conditions.
Mitigation:
Upgrade to the latest version of FontForge.