First published: Sun Jul 23 2017(Updated: )
FontForge 20161012 is vulnerable to a heap-based buffer over-read in readcfftopdicts (parsettf.c) resulting in DoS or code execution via a crafted otf file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Fonts | =20161012 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-11572 is classified as a high-severity vulnerability due to its potential for causing denial of service (DoS) or enabling code execution.
To fix CVE-2017-11572, you should update FontForge to a patched version that resolves the buffer over-read issue.
CVE-2017-11572 can be exploited through crafted OpenType Font (otf) files, leading to DoS attacks or arbitrary code execution.
CVE-2017-11572 affects FontForge version 20161012 specifically.
While CVE-2017-11572 primarily causes DoS and code execution, there is a potential risk of data breaches if malicious code is executed.