ID |
CVE-2017-16899
|
Summary |
An array index error in the fig2dev program in Xfig 3.2.6a allows remote attackers to cause a denial-of-service attack or information disclosure with a maliciously crafted Fig format file, related to a negative font value in dev/gentikz.c, and the read_textobject functions in read.c and read1_3.c. |
References |
|
Vulnerable Configurations |
-
cpe:2.3:a:xfig_project:xfig:3.2.6a:*:*:*:*:*:*:*
cpe:2.3:a:xfig_project:xfig:3.2.6a:*:*:*:*:*:*:*
-
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
-
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
|
CVSS |
Base: | 5.8 (as of 11-12-2017 - 17:08) |
Impact: | |
Exploitability: | |
|
CWE |
CWE-129 |
CAPEC |
-
Overflow Buffers
Buffer Overflow attacks target improper or missing bounds checking on buffer operations, typically triggered by input injected by an adversary. As a consequence, an adversary is able to write past the boundaries of allocated buffer regions in memory, causing a program crash or potentially redirection of execution as per the adversaries' choice.
|
Access |
Vector | Complexity | Authentication |
NETWORK |
MEDIUM |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
PARTIAL |
NONE |
PARTIAL |
|
cvss-vector
via4
|
AV:N/AC:M/Au:N/C:P/I:N/A:P
|
refmap
via4
|
|
Last major update |
11-12-2017 - 17:08 |
Published |
20-11-2017 - 18:29 |
Last modified |
11-12-2017 - 17:08 |