First published: Wed Apr 23 2025(Updated: )
Segmentation fault in fig2dev in version 3.2.9a allows an attacker to availability via local input manipulation via read_arcobject function.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fig2Dev |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-46400 is considered a high severity vulnerability due to its potential to cause a segmentation fault and compromise system availability.
To fix CVE-2025-46400, it is recommended to update to the latest version of fig2dev that addresses this vulnerability.
CVE-2025-46400 affects the fig2dev software, specifically version 3.2.9a.
CVE-2025-46400 is a segmentation fault vulnerability that can lead to denial of service when exploited.
Yes, CVE-2025-46400 can be exploited via local input manipulation, making it accessible to local users.