First published: Wed Sep 08 2021(Updated: )
A code execution vulnerability exists in the DL_Dxf::handleLWPolylineData functionality of Ribbonsoft dxflib 3.17.0. A specially-crafted .dxf file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
dxflib | =3.17.0 | |
Fedora EPEL | =7.0 | |
Fedora EPEL | =8.0 | |
Red Hat Fedora | =35 | |
Red Hat Fedora | =36 | |
Red Hat Fedora | =37 | |
Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21897 has a high severity level due to the potential for remote code execution via a specially-crafted .dxf file.
To mitigate CVE-2021-21897, update to the latest version of Ribbonsoft dxflib or apply any available patches from your Linux distribution.
CVE-2021-21897 specifically affects Ribbonsoft dxflib version 3.17.0 and certain versions of Fedora and Debian distributions.
CVE-2021-21897 is categorized as a code execution vulnerability that can lead to a heap buffer overflow.
Yes, CVE-2021-21897 can be exploited remotely if an attacker sends a malicious .dxf file to a vulnerable system.