First published: Sun Jul 23 2017(Updated: )
FontForge 20161012 is vulnerable to a buffer over-read in strnmatch (char.c) resulting in DoS or code execution via a crafted otf file, related to a call from the readttfcopyrights function in parsettf.c.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Fonts | =20161012 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-11575 has been classified as a critical vulnerability due to its potential to cause a denial of service (DoS) or allow code execution.
To fix CVE-2017-11575, update FontForge to a version newer than 20161012 that addresses this vulnerability.
CVE-2017-11575 can be exploited to trigger a buffer over-read when processing a maliciously crafted OpenType font file.
CVE-2017-11575 specifically affects FontForge version 20161012.
Yes, CVE-2017-11575 is related to a flaw in the readttfcopyrights function in parsettf.c, which can lead to the vulnerability.