Vulnerability Description
A stack-based buffer overflow in the genptk_text component in genptk.c of fig2dev 3.2.7b allows attackers to cause a denial of service (DOS) via converting a xfig file into ptk format.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Fig2Dev Project | Fig2Dev | 3.2.7b |
| Debian | Debian Linux | 9.0 |
Related Weaknesses (CWE)
References
- https://cwe.mitre.org/data/definitions/121.htmlTechnical Description
- https://lists.debian.org/debian-lts-announce/2021/10/msg00002.htmlMailing ListThird Party Advisory
- https://sourceforge.net/p/mcj/tickets/78/ExploitIssue TrackingPatch
- https://cwe.mitre.org/data/definitions/121.htmlTechnical Description
- https://lists.debian.org/debian-lts-announce/2021/10/msg00002.htmlMailing ListThird Party Advisory
- https://sourceforge.net/p/mcj/tickets/78/ExploitIssue TrackingPatch
FAQ
What is CVE-2020-21675?
CVE-2020-21675 is a vulnerability with a CVSS score of 5.5 (MEDIUM). A stack-based buffer overflow in the genptk_text component in genptk.c of fig2dev 3.2.7b allows attackers to cause a denial of service (DOS) via converting a xfig file into ptk format.
How severe is CVE-2020-21675?
CVE-2020-21675 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-21675?
Check the references section above for vendor advisories and patch information. Affected products include: Fig2Dev Project Fig2Dev, Debian Debian Linux.