Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2010-4259Improper Restriction of Operations within the Bounds of a Memory Buffer in Fontforge

Severity
6.8MEDIUMNVD
EPSS
23.1%
top 4.05%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedDec 7
Latest updateMay 17

Description

Stack-based buffer overflow in FontForge 20100501 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long CHARSET_REGISTRY header in a BDF font file.

CVSS vector

AV:N/AC:M/C:P/I:P/A:PExploitability: 8.6 | Impact: 6.4

Affected Packages3 packages

debiandebian/fontforge< fontforge 0.0.20100501-4 (bookworm)
Debianfontforge/fontforge< 0.0.20100501-4+3

Patches

🔴Vulnerability Details

2
GHSA
GHSA-5g26-3q47-628q: Stack-based buffer overflow in FontForge 20100501 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitra2022-05-17
OSV
CVE-2010-4259: Stack-based buffer overflow in FontForge 20100501 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitra2010-12-07

💥Exploits & PoCs

1
Exploit-DB
FontForge - '.BDF' Font File Stack Buffer Overflow (PoC)2010-12-14

📋Vendor Advisories

2
Red Hat
FontForge: Stack-based buffer overflow by processing specially-crafted CHARSET_REGISTRY font file header2010-12-01
Debian
CVE-2010-4259: fontforge - Stack-based buffer overflow in FontForge 20100501 allows remote attackers to cau...2010

💬Community

1
Bugzilla
CVE-2010-4259 FontForge: Stack-based buffer overflow by processing specially-crafted CHARSET_REGISTRY font file header2010-12-02