xfpt versions prior to 1.01 fails to handle appropriately some parameters inside the input data, resulting in a stack-based buffer overflow vulnerability. When a user of the affected product is tricked to process a specially crafted file, arbitrary code may be executed on the user's environment.
References
Link | Resource |
---|---|
https://github.com/PhilipHazel/xfpt | Product |
https://github.com/PhilipHazel/xfpt/commit/a690304bbd3fd19e9dfdad50dcc87ad829f744e4 | Patch |
https://jvn.jp/en/vu/JVNVU96498690/ | Third Party Advisory |
Configurations
History
15 Oct 2024, 14:35
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-120 |
06 Sep 2024, 22:52
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
CPE | cpe:2.3:a:philiphazel:xfpt:*:*:*:*:*:*:*:* | |
CWE | CWE-787 | |
First Time |
Philiphazel
Philiphazel xfpt |
|
Summary |
|
|
References | () https://github.com/PhilipHazel/xfpt - Product | |
References | () https://github.com/PhilipHazel/xfpt/commit/a690304bbd3fd19e9dfdad50dcc87ad829f744e4 - Patch | |
References | () https://jvn.jp/en/vu/JVNVU96498690/ - Third Party Advisory |
29 Aug 2024, 20:36
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.0 |
CWE | CWE-121 |
29 Aug 2024, 11:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-08-29 11:15
Updated : 2024-10-15 14:35
NVD link : CVE-2024-43700
Mitre link : CVE-2024-43700
CVE.ORG link : CVE-2024-43700
JSON object : View
Products Affected
philiphazel
- xfpt