Описание
FontForge SFD File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of FontForge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of SFD files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-28564.
A flaw was found in FontForge. This use-after-free vulnerability, occurring during the parsing of SFD (Spline Font Database) files, allows a remote attacker to execute arbitrary code. Successful exploitation requires user interaction, such as opening a specially crafted malicious file or visiting a malicious web page. This can lead to complete control over the affected system.
Отчет
This vulnerability is rated Important for Red Hat because it allows remote code execution in FontForge through a use-after-free flaw when parsing specially crafted SFD files. Successful exploitation requires user interaction, such as opening a malicious file or visiting a malicious web page. This affects FontForge as shipped in Red Hat Enterprise Linux versions 6, 7, 8, 9, and 10, as well as Fedora and Red Hat In-Vehicle OS.
Меры по смягчению последствий
To mitigate this issue, users should avoid opening untrusted SFD files or visiting malicious web pages. Exercise caution with content from unknown or suspicious sources to prevent exploitation of this vulnerability.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Enterprise Linux 6 | fontforge | Out of support scope | ||
| Red Hat Enterprise Linux 7 | fontforge | Affected | ||
| Red Hat Enterprise Linux 8 | fontforge | Affected | ||
| Red Hat Enterprise Linux 10 | fontforge | Fixed | RHSA-2026:2230 | 09.02.2026 |
| Red Hat Enterprise Linux 10.0 Extended Update Support | fontforge | Fixed | RHSA-2026:2232 | 09.02.2026 |
| Red Hat Enterprise Linux 9 | fontforge | Fixed | RHSA-2026:2039 | 05.02.2026 |
| Red Hat Enterprise Linux 9.4 Extended Update Support | fontforge | Fixed | RHSA-2026:2566 | 11.02.2026 |
| Red Hat Enterprise Linux 9.6 Extended Update Support | fontforge | Fixed | RHSA-2026:2213 | 09.02.2026 |
Показывать по
Дополнительная информация
Статус:
EPSS
8.8 High
CVSS3
Связанные уязвимости
FontForge SFD File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of FontForge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of SFD files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-28564.
FontForge SFD File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of FontForge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of SFD files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-28564.
FontForge SFD File Parsing Use-After-Free Remote Code Execution Vulner ...
FontForge SFD File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of FontForge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of SFD files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-28564.
EPSS
8.8 High
CVSS3