First published: Sun Jul 23 2017(Updated: )
FontForge 20161012 is vulnerable to a heap-based buffer over-read in PSCharStringToSplines (psread.c) resulting in DoS or code execution via a crafted otf file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Fonts | =20161012 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-11568 has a high severity due to its potential for remote code execution and denial of service.
To fix CVE-2017-11568, you should update to a version of FontForge that has patched the vulnerability.
CVE-2017-11568 can be exploited through crafted OTF files that trigger a heap-based buffer over-read.
FontForge version 20161012 is specifically affected by CVE-2017-11568.
Exploitation of CVE-2017-11568 can lead to denial of service or potentially allow attackers to execute arbitrary code.