First published: Sun Jul 23 2017(Updated: )
FontForge 20161012 is vulnerable to a heap-based buffer overflow in readcffset (parsettf.c) resulting in DoS or code execution via a crafted otf file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Fonts | =20161012 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-11574 is classified as a critical vulnerability due to its potential for code execution and denial of service.
To fix CVE-2017-11574, upgrade FontForge to a version later than 20161012 that addresses the heap-based buffer overflow.
The impact of CVE-2017-11574 includes the possibility of remote code execution and system denial of service when processing a specially crafted otf file.
CVE-2017-11574 affects FontForge version 20161012 only.
You can determine if your system is vulnerable by checking if FontForge version 20161012 is installed and if it is processing potentially malicious otf files.