CVE-2020-21683Classic Buffer Overflow in Project Fig2dev

Severity
5.5MEDIUMNVD
EPSS
0.3%
top 47.58%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedAug 10
Latest updateJun 23

Description

A global buffer overflow in the shade_or_tint_name_after_declare_color in genpstricks.c of fig2dev 3.2.7b allows attackers to cause a denial of service (DOS) via converting a xfig file into pstricks format.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages3 packages

Debianfig2dev_project/fig2dev< 1:3.2.8-1+3
Ubuntufig2dev_project/fig2dev< 1:3.2.6a-6ubuntu1.1+esm1+3

Patches

🔴Vulnerability Details

4
OSV
fig2dev vulnerabilities2025-06-23
GHSA
GHSA-47mr-c7m9-g85h: A global buffer overflow in the shade_or_tint_name_after_declare_color in genpstricks2022-05-24
CVEList
CVE-2020-21683: A global buffer overflow in the shade_or_tint_name_after_declare_color in genpstricks2021-08-10
OSV
CVE-2020-21683: A global buffer overflow in the shade_or_tint_name_after_declare_color in genpstricks2021-08-10

📋Vendor Advisories

3
Ubuntu
Fig2dev vulnerabilities2025-06-23
Red Hat
transfig: A global buffer overflow in the shade_or_tint_name_after_declare_color in genpstricks.c could result in a denial of service2021-08-10
Debian
CVE-2020-21683: fig2dev - A global buffer overflow in the shade_or_tint_name_after_declare_color in genpst...2020
CVE-2020-21683 — Classic Buffer Overflow | cvebase