FontForge 20161012 is vulnerable to a buffer over-read in strnmatch (char.c) resulting in DoS or code execution via a crafted otf file, related to a call from the readttfcopyrights function in parsettf.c.
References
Link | Resource |
---|---|
https://github.com/fontforge/fontforge/issues/3096 | Issue Tracking Patch Third Party Advisory |
http://www.debian.org/security/2017/dsa-3958 |
Configurations
Information
Published : 2017-07-23 15:29
Updated : 2020-01-13 06:23
NVD link : CVE-2017-11575
Mitre link : CVE-2017-11575
JSON object : View
CWE
CWE-125
Out-of-bounds Read
Products Affected
fontforge
- fontforge