CVE-2017-11577
Debian Security Advisory 3958-1
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
FontForge 20161012 is vulnerable to a buffer over-read in getsid (parsettf.c) resulting in DoS or code execution via a crafted otf file.
FontForge versión 20161012, es vulnerable a una lectura excesiva del búfer en la función getsid (parsettf.c) resultando en una DoS o ejecución de código por medio de un archivo otf creado.
It was discovered that FontForge, a font editor, did not correctly validate its input. An attacker could use this flaw by tricking a user into opening a maliciously crafted OpenType font file, thus causing a denial-of-service via application crash, or execution of arbitrary code. For the oldstable distribution (jessie), these problems have been fixed in version 20120731.b-5+deb8u1. For the stable distribution (stretch), these problems have been fixed in version 1:20161005~dfsg-4+deb9u1.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-07-23 CVE Reserved
- 2017-07-23 CVE Published
- 2024-08-05 CVE Updated
- 2025-06-19 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-125: Out-of-bounds Read
CAPEC
References (2)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://github.com/fontforge/fontforge/issues/3088 | 2020-01-13 |
URL | Date | SRC |
---|---|---|
http://www.debian.org/security/2017/dsa-3958 | 2020-01-13 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Fontforge Search vendor "Fontforge" | Fontforge Search vendor "Fontforge" for product "Fontforge" | 20161012 Search vendor "Fontforge" for product "Fontforge" and version "20161012" | - |
Affected
|