Description
A stack-based buffer overflow in the genpstrx_text() component in genpstricks.c of fig2dev 3.2.7b allows attackers to cause a denial of service (DOS) via converting a xfig file into pstricks format.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2778-1 | fig2dev security update |
Debian DLA |
DLA-3304-1 | fig2dev security update |
EUVD |
EUVD-2020-14444 | A stack-based buffer overflow in the genpstrx_text() component in genpstricks.c of fig2dev 3.2.7b allows attackers to cause a denial of service (DOS) via converting a xfig file into pstricks format. |
Ubuntu USN |
USN-5864-1 | Fig2dev vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T14:30:33.376Z
Reserved: 2020-08-13T00:00:00.000Z
Link: CVE-2020-21676
No data.
Status : Modified
Published: 2021-08-10T21:15:07.407
Modified: 2024-11-21T05:12:46.867
Link: CVE-2020-21676
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN