CVE-2020-21680Out-of-bounds Write in Project Fig2dev

Severity
5.5MEDIUMNVD
EPSS
0.2%
top 61.88%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedAug 10
Latest updateJun 23

Description

A stack-based buffer overflow in the put_arrow() component in genpict2e.c of fig2dev 3.2.7b allows attackers to cause a denial of service (DOS) via converting a xfig file into pict2e format.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages3 packages

Debianfig2dev_project/fig2dev< 1:3.2.8-1+3
Ubuntufig2dev_project/fig2dev< 1:3.2.6a-6ubuntu1.1+esm1+3

Patches

🔴Vulnerability Details

4
OSV
fig2dev vulnerabilities2025-06-23
GHSA
GHSA-ggqm-jgv2-2w64: A stack-based buffer overflow in the put_arrow() component in genpict2e2022-05-24
OSV
CVE-2020-21680: A stack-based buffer overflow in the put_arrow() component in genpict2e2021-08-10
CVEList
CVE-2020-21680: A stack-based buffer overflow in the put_arrow() component in genpict2e2021-08-10

📋Vendor Advisories

3
Ubuntu
Fig2dev vulnerabilities2025-06-23
Red Hat
transfig: A stack-based buffer overflow in the put_arrow() component in genpict2e.c could result in a denial of service2021-08-10
Debian
CVE-2020-21680: fig2dev - A stack-based buffer overflow in the put_arrow() component in genpict2e.c of fig...2020
CVE-2020-21680 — Out-of-bounds Write in Project Fig2dev | cvebase