CVE-2020-21684Classic Buffer Overflow in Project Fig2dev

Severity
5.5MEDIUMNVD
EPSS
0.3%
top 44.75%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedAug 10
Latest updateMay 24

Description

A global buffer overflow in the put_font in genpict2e.c of fig2dev 3.2.7b allows attackers to cause a denial of service (DOS) via converting a xfig file into pict2e format.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages2 packages

Debianfig2dev_project/fig2dev< 1:3.2.8-1+3

Patches

🔴Vulnerability Details

3
GHSA
GHSA-9g83-2v33-p7q8: A global buffer overflow in the put_font in genpict2e2022-05-24
OSV
CVE-2020-21684: A global buffer overflow in the put_font in genpict2e2021-08-10
CVEList
CVE-2020-21684: A global buffer overflow in the put_font in genpict2e2021-08-10

📋Vendor Advisories

2
Red Hat
transfig: A global buffer overflow in the put_font in genpict2e.c could result in a denial of service2021-08-10
Debian
CVE-2020-21684: fig2dev - A global buffer overflow in the put_font in genpict2e.c of fig2dev 3.2.7b allows...2020
CVE-2020-21684 — Classic Buffer Overflow | cvebase