CVE-2017-11571

Source
https://nvd.nist.gov/vuln/detail/CVE-2017-11571
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-11571.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2017-11571
Related
Published
2017-07-23T22:29:00Z
Modified
2025-01-14T07:01:19.932586Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

FontForge 20161012 is vulnerable to a stack-based buffer overflow in addnibble (parsettf.c) resulting in DoS or code execution via a crafted otf file.

References

Affected packages

Debian:11 / fontforge

Package

Name
fontforge
Purl
pkg:deb/debian/fontforge?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:20170731~dfsg-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / fontforge

Package

Name
fontforge
Purl
pkg:deb/debian/fontforge?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:20170731~dfsg-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / fontforge

Package

Name
fontforge
Purl
pkg:deb/debian/fontforge?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:20170731~dfsg-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Git / github.com/fontforge/fontforge

Affected ranges

Type
GIT
Repo
https://github.com/fontforge/fontforge
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

2.*

2.0.20140101

Other

20140813
20141013
20141014
20141126
20141230
20150228
20150330
20150430
20150612
20150824
20160403
20160404
20160930
20161001
20161004
20161005
20161012
v20110222
v20120731-b

v2.*

v2.1.0