First published: Tue May 18 2021(Updated: )
A heap-based buffer overflow vulnerability exists in LibreDWG 0.10.1 via the read_system_page function at libredwg-0.10.1/src/decode_r2007.c:666:5, which causes a denial of service by submitting a dwg file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU LibreDWG | =0.10.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this heap-based buffer overflow vulnerability is CVE-2020-23861.
The severity of CVE-2020-23861 is medium with a CVSS score of 5.5.
The GNU LibreDWG version 0.10.1 is affected by CVE-2020-23861.
CVE-2020-23861 causes a denial of service by submitting a malicious DWG file that triggers a heap-based buffer overflow in the read_system_page function of LibreDWG.
At the time of this writing, there is no known fix available for CVE-2020-23861. It is recommended to follow the recommendations provided by the vendor or software developer.