Описание
fig2dev 3.2.7b contains a stack buffer overflow in the read_textobject function in read.c.
In transfig's fig2dev 3.2.7b it is possible for an attacker to create a specially crafted file that causes a buffer overflow due to the usage of fgets. This leads to a denial of service, impacting availability of the program.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Enterprise Linux 6 | transfig | Out of support scope | ||
| Red Hat Enterprise Linux 7 | transfig | Out of support scope | ||
| Red Hat Enterprise Linux 8 | transfig | Will not fix | ||
| Red Hat Enterprise Linux 9 | transfig | Not affected |
Показывать по
Дополнительная информация
Статус:
5.5 Medium
CVSS3
Связанные уязвимости
fig2dev 3.2.7b contains a stack buffer overflow in the read_textobject function in read.c.
fig2dev 3.2.7b contains a stack buffer overflow in the read_textobject function in read.c.
fig2dev 3.2.7b contains a stack buffer overflow in the read_textobject ...
fig2dev 3.2.7b contains a stack buffer overflow in the read_textobject function in read.c.
Уязвимость функции read_textobject компонента read.c утилиты для преобразования файлов с расширением .fig Fig2dev, позволяющая нарушителю вызвать отказ в обслуживании
5.5 Medium
CVSS3