An array index error in the fig2dev program in Xfig 3.2.6a allows remote attackers to cause a denial-of-service attack or information disclosure with a maliciously crafted Fig format file, related to a negative font value in dev/gentikz.c, and the read_textobject functions in read.c and read1_3.c.
References
Link | Resource |
---|---|
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=881143 | Issue Tracking Third Party Advisory |
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=881143 | Issue Tracking Third Party Advisory |
Configurations
History
21 Nov 2024, 03:17
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=881143 - Issue Tracking, Third Party Advisory |
Information
Published : 2017-11-20 18:29
Updated : 2024-11-21 03:17
NVD link : CVE-2017-16899
Mitre link : CVE-2017-16899
CVE.ORG link : CVE-2017-16899
JSON object : View
Products Affected
debian
- debian_linux
xfig_project
- xfig
CWE
CWE-129
Improper Validation of Array Index