Description
FontForge 20161012 is vulnerable to a buffer over-read in strnmatch (char.c) resulting in DoS or code execution via a crafted otf file, related to a call from the readttfcopyrights function in parsettf.c.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1065-1 | fontforge security update |
Debian DSA |
DSA-3958-1 | fontforge security update |
EUVD |
EUVD-2017-3190 | FontForge 20161012 is vulnerable to a buffer over-read in strnmatch (char.c) resulting in DoS or code execution via a crafted otf file, related to a call from the readttfcopyrights function in parsettf.c. |
Ubuntu USN |
USN-3409-1 | FontForge vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T18:12:40.671Z
Reserved: 2017-07-23T00:00:00.000Z
Link: CVE-2017-11575
No data.
Status : Modified
Published: 2017-07-23T22:29:00.447
Modified: 2026-05-13T00:24:29.033
Link: CVE-2017-11575
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
EUVD
Ubuntu USN