First published: Fri Nov 19 2021(Updated: )
A code execution vulnerability exists in the dwgCompressor::copyCompBytes21 functionality of LibreCad libdxfrw 2.2.0-rc2-19-ge02f3580. A specially-crafted .dwg file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/librecad | 2.1.3-1.2+deb10u1 2.1.3-1.3+deb11u1 2.2.0-1 | |
LibreCad libdxfrw | =2.2.0-rc2-19-ge02f3580 | |
Fedoraproject Fedora | =34 | |
Fedoraproject Fedora | =35 | |
Debian | =9.0 | |
Debian | =10.0 | |
Debian | =11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21899 is classified as a critical vulnerability due to its potential for remote code execution.
To fix CVE-2021-21899, update LibreCad libdxfrw to versions 2.1.3-1.2+deb10u1, 2.1.3-1.3+deb11u1, or 2.2.0-1 as appropriate.
CVE-2021-21899 affects users of LibreCad libdxfrw version 2.2.0-rc2-19-ge02f3580 and various Debian and Fedora distributions.
An attacker could exploit CVE-2021-21899 by crafting a malicious .dwg file, leading to a heap buffer overflow and potential code execution.
CVE-2021-21899 is a code execution vulnerability characterized by a heap buffer overflow.