Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-15269

Опубликовано: 31 дек. 2025
Источник: redhat
CVSS3: 8.8
EPSS Низкий

Описание

FontForge SFD File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of FontForge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of SFD files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-28564.

A flaw was found in FontForge. This use-after-free vulnerability, occurring during the parsing of SFD (Spline Font Database) files, allows a remote attacker to execute arbitrary code. Successful exploitation requires user interaction, such as opening a specially crafted malicious file or visiting a malicious web page. This can lead to complete control over the affected system.

Отчет

This vulnerability is rated Important for Red Hat because it allows remote code execution in FontForge through a use-after-free flaw when parsing specially crafted SFD files. Successful exploitation requires user interaction, such as opening a malicious file or visiting a malicious web page. This affects FontForge as shipped in Red Hat Enterprise Linux versions 6, 7, 8, 9, and 10, as well as Fedora and Red Hat In-Vehicle OS.

Меры по смягчению последствий

To mitigate this issue, users should avoid opening untrusted SFD files or visiting malicious web pages. Exercise caution with content from unknown or suspicious sources to prevent exploitation of this vulnerability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6fontforgeOut of support scope
Red Hat Enterprise Linux 7fontforgeAffected
Red Hat Enterprise Linux 8fontforgeAffected
Red Hat Enterprise Linux 10fontforgeFixedRHSA-2026:223009.02.2026
Red Hat Enterprise Linux 10.0 Extended Update SupportfontforgeFixedRHSA-2026:223209.02.2026
Red Hat Enterprise Linux 9fontforgeFixedRHSA-2026:203905.02.2026
Red Hat Enterprise Linux 9.4 Extended Update SupportfontforgeFixedRHSA-2026:256611.02.2026
Red Hat Enterprise Linux 9.6 Extended Update SupportfontforgeFixedRHSA-2026:221309.02.2026

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-416
https://bugzilla.redhat.com/show_bug.cgi?id=2426423fontforge: FontForge: Remote Code Execution via Use-After-Free in SFD file parsing

EPSS

Процентиль: 59%
0.00366
Низкий

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
ubuntu
3 месяца назад

FontForge SFD File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of FontForge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of SFD files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-28564.

CVSS3: 8.8
nvd
3 месяца назад

FontForge SFD File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of FontForge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of SFD files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-28564.

CVSS3: 8.8
debian
3 месяца назад

FontForge SFD File Parsing Use-After-Free Remote Code Execution Vulner ...

CVSS3: 8.8
github
3 месяца назад

FontForge SFD File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of FontForge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of SFD files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-28564.

oracle-oval
около 2 месяцев назад

ELSA-2026-2230: fontforge security update (IMPORTANT)

EPSS

Процентиль: 59%
0.00366
Низкий

8.8 High

CVSS3