CVE-2020-21676Out-of-bounds Write in Project Fig2dev

Severity
5.5MEDIUMNVD
EPSS
0.7%
top 28.45%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 10
Latest updateFeb 13

Description

A stack-based buffer overflow in the genpstrx_text() component in genpstricks.c of fig2dev 3.2.7b allows attackers to cause a denial of service (DOS) via converting a xfig file into pstricks format.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages2 packages

Debianfig2dev_project/fig2dev< 1:3.2.8-1+3

Also affects: Debian Linux 10.0, 9.0

Patches

🔴Vulnerability Details

4
OSV
fig2dev vulnerabilities2023-02-13
GHSA
GHSA-h7rp-ww8c-5x58: A stack-based buffer overflow in the genpstrx_text() component in genpstricks2022-05-24
CVEList
CVE-2020-21676: A stack-based buffer overflow in the genpstrx_text() component in genpstricks2021-08-10
OSV
CVE-2020-21676: A stack-based buffer overflow in the genpstrx_text() component in genpstricks2021-08-10

📋Vendor Advisories

3
Ubuntu
Fig2dev vulnerabilities2023-02-13
Red Hat
transfig: A stack-based buffer overflow in the genpstrx_text() component in genpstricks.c could result in a denial of service2021-08-10
Debian
CVE-2020-21676: fig2dev - A stack-based buffer overflow in the genpstrx_text() component in genpstricks.c ...2020
CVE-2020-21676 — Out-of-bounds Write in Project Fig2dev | cvebase