CVE-2017-11576Improper Restriction of Operations within the Bounds of a Memory Buffer in Fontforge

Severity
5.5MEDIUMNVD
OSV7.8
EPSS
0.2%
top 51.76%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJul 23
Latest updateMay 13

Description

FontForge 20161012 does not ensure a positive size in a weight vector memcpy call in readcfftopdict (parsettf.c) resulting in DoS via a crafted otf file.

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

debiandebian/fontforge< fontforge 1:20170731~dfsg-1 (bookworm)
Debianfontforge/fontforge< 1:20170731~dfsg-1+3
Ubuntufontforge/fontforge< 20120731.b-5ubuntu0.1
NVDfontforge/fontforge20161012

Patches

🔴Vulnerability Details

3
GHSA
GHSA-f6j8-4mx6-p423: FontForge 20161012 does not ensure a positive size in a weight vector memcpy call in readcfftopdict (parsettf2022-05-13
OSV
fontforge vulnerabilities2017-09-04
OSV
CVE-2017-11576: FontForge 20161012 does not ensure a positive size in a weight vector memcpy call in readcfftopdict (parsettf2017-07-23

📋Vendor Advisories

3
Ubuntu
FontForge vulnerabilities2017-09-04
Red Hat
fontforge: Does not ensure a positive size in a weight vector memcpy call in readcfftopdict function2017-06-14
Debian
CVE-2017-11576: fontforge - FontForge 20161012 does not ensure a positive size in a weight vector memcpy cal...2017

💬Community

2
Bugzilla
CVE-2017-11576 fontforge: Does not ensure a positive size in a weight vector memcpy call in readcfftopdict function2017-07-26
Bugzilla
CVE-2017-11568 CVE-2017-11569 CVE-2017-11570 CVE-2017-11571 CVE-2017-11572 CVE-2017-11573 CVE-2017-11574 CVE-2017-11575 CVE-2017-11576 CVE-2017-11577 fontforge: various flaws [fedora-all]2017-07-26
CVE-2017-11576 — Debian Fontforge vulnerability | cvebase