First published: Thu Jul 16 2020(Updated: )
An issue was discovered in GNU LibreDWG through 0.9.3. Crafted input will lead to a stack overflow in bits.c, possibly related to bit_read_TF.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU LibreDWG | <=0.9.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-20912 is classified as a critical vulnerability due to the potential for exploitation leading to a stack overflow.
To fix CVE-2019-20912, upgrade GNU LibreDWG to a version later than 0.9.3 where the vulnerability has been addressed.
CVE-2019-20912 can allow attackers to execute arbitrary code due to a stack overflow caused by crafted input.
All versions of GNU LibreDWG up to and including 0.9.3 are affected by CVE-2019-20912.
Any unauthorized user can potentially exploit the CVE-2019-20912 vulnerability by providing specially crafted input.