8 results (0.006 seconds)

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 1

A user able to control file input to Gerbv, between versions 2.4.0 and 2.10.0, can cause a crash and cause denial-of-service with a specially crafted Gerber RS-274X file. • https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4508 https://github.com/gerbv/gerbv/commit/5517e22250e935dc7f86f64ad414aeae3dbcb36a https://github.com/gerbv/gerbv/issues/191 • CWE-824: Access of Uninitialized Pointer •

CVSS: 9.3EPSS: 0%CPEs: 4EXPL: 1

An out-of-bounds read vulnerability exists in the RS-274X aperture macro multiple outline primitives functionality of Gerbv 2.7.0 and dev (commit b5f1eacd), and Gerbv forked 2.7.1 and 2.8.0. A specially-crafted Gerber file can lead to information disclosure. An attacker can provide a malicious file to trigger this vulnerability. Se presenta una vulnerabilidad de lectura fuera de límites en la funcionalidad de primitivas de contorno múltiple de la macro RS-274X de Gerbv versiones 2.7.0 y dev (commit b5f1eacd), y Gerbv forked versiones 2.7.1 y 2.8.0. Un archivo Gerber especialmente diseñado puede conllevar a una divulgación de información. • https://talosintelligence.com/vulnerability_reports/TALOS-2021-1416 • CWE-125: Out-of-bounds Read CWE-755: Improper Handling of Exceptional Conditions •

CVSS: 9.3EPSS: 0%CPEs: 2EXPL: 1

An out-of-bounds read vulnerability exists in the RS-274X aperture macro outline primitive functionality of Gerbv 2.7.0 and dev (commit b5f1eacd) and the forked version of Gerbv (commit d7f42a9a). A specially-crafted Gerber file can lead to information disclosure. An attacker can provide a malicious file to trigger this vulnerability. Se presenta una vulnerabilidad de lectura fuera de límites en la funcionalidad primitiva del contorno de la macro RS-274X de Gerbv versiones 2.7.0 y dev (commit b5f1eacd) y la versión forked de Gerbv (commit d7f42a9a). Un archivo Gerber especialmente diseñado puede conllevar a una divulgación de información. • https://talosintelligence.com/vulnerability_reports/TALOS-2021-1413 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-125: Out-of-bounds Read •

CVSS: 6.3EPSS: 0%CPEs: 4EXPL: 1

An information disclosure vulnerability exists in the pick-and-place rotation parsing functionality of Gerbv 2.7.0 and dev (commit b5f1eacd), and Gerbv forked 2.8.0. A specially-crafted pick-and-place file can exploit the missing initialization of a structure to leak memory contents. An attacker can provide a malicious file to trigger this vulnerability. Se presenta una vulnerabilidad de divulgación de información en la funcionalidad pick-and-place rotation parsing de Gerbv versiones 2.7.0 y dev (commit b5f1eacd), y Gerbv forked versión 2.8.0. Un archivo pick-and-place especialmente diseñado puede explotar la falta de inicialización de una estructura para perder el contenido de la memoria. • https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PTGBC37N2FV7NKOWFVCFMPAFYEPHSB7C https://talosintelligence.com/vulnerability_reports/TALOS-2021-1417 https://www.debian.org/security/2022/dsa-5306 • CWE-456: Missing Initialization of a Variable CWE-909: Missing Initialization of Resource •

CVSS: 10.0EPSS: 0%CPEs: 4EXPL: 1

A use-after-free vulnerability exists in the RS-274X aperture definition tokenization functionality of Gerbv 2.7.0 and dev (commit b5f1eacd) and Gerbv forked 2.7.1. A specially-crafted gerber file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability. Se presenta una vulnerabilidad de uso de memoria previamente liberada en la funcionalidad RS-274X aperture definition tokenization de Gerbv versiones 2.7.0 y dev (commit b5f1eacd) y Gerbv forked versión 2.7.1. Un archivo gerber especialmente diseñado puede conllevar a una ejecución de código. • https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TUM5GIUZJ7AVHVCXDZW6ZVCAPV2ISN47 https://talosintelligence.com/vulnerability_reports/TALOS-2021-1415 https://www.debian.org/security/2022/dsa-5306 • CWE-252: Unchecked Return Value •