First published: Mon May 17 2021(Updated: )
A heap based buffer overflow vulnerability exists in GNU LibreDWG 0.10 via read_2004_compressed_section ../../src/decode.c:2417.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU LibreDWG | =0.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-21832 is high with a CVSS score of 8.8.
CVE-2020-21832 is a heap-based buffer overflow vulnerability in GNU LibreDWG 0.10, which could allow an attacker to execute arbitrary code or cause a denial of service.
GNU LibreDWG 0.10 is the affected software for CVE-2020-21832.
At the time of writing this, there is no official fix available for CVE-2020-21832. It is recommended to update to a patched version when it becomes available.
You can find more information about CVE-2020-21832 at the following references: [http://gnu.com](http://gnu.com), [https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574492612](https://github.com/LibreDWG/libredwg/issues/188#issuecomment-574492612).