First published: Sun Jul 23 2017(Updated: )
FontForge 20161012 is vulnerable to a stack-based buffer overflow in addnibble (parsettf.c) resulting in DoS or code execution via a crafted otf file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Fonts | =20161012 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-11571 has a high severity due to its potential for stack-based buffer overflow leading to DoS or arbitrary code execution.
To fix CVE-2017-11571, update FontForge to a version that patches this vulnerability.
CVE-2017-11571 is caused by a stack-based buffer overflow in the addnibble function within parsettf.c.
CVE-2017-11571 is found in FontForge version 20161012.
The risks of CVE-2017-11571 include potential denial of service or the execution of malicious code via crafted OpenType font files.