CVE-2020-21682Classic Buffer Overflow in Project Fig2dev

Severity
5.5MEDIUMNVD
EPSS
0.1%
top 70.83%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedAug 10
Latest updateJun 23

Description

A global buffer overflow in the set_fill component in genge.c of fig2dev 3.2.7b allows attackers to cause a denial of service (DOS) via converting a xfig file into ge format.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages3 packages

Debianfig2dev_project/fig2dev< 1:3.2.8-1+3
Ubuntufig2dev_project/fig2dev< 1:3.2.6a-6ubuntu1.1+esm1+3

Patches

🔴Vulnerability Details

4
OSV
fig2dev vulnerabilities2025-06-23
GHSA
GHSA-f38c-75f7-6g7p: A global buffer overflow in the set_fill component in genge2022-05-24
CVEList
CVE-2020-21682: A global buffer overflow in the set_fill component in genge2021-08-10
OSV
CVE-2020-21682: A global buffer overflow in the set_fill component in genge2021-08-10

📋Vendor Advisories

3
Ubuntu
Fig2dev vulnerabilities2025-06-23
Red Hat
transfig: A global buffer overflow in the set_fill component in genge.c could result in a denial of service2021-08-10
Debian
CVE-2020-21682: fig2dev - A global buffer overflow in the set_fill component in genge.c of fig2dev 3.2.7b ...2020
CVE-2020-21682 — Classic Buffer Overflow | cvebase