Description
A flaw was found in xfig. This vulnerability allows possible code execution via local input manipulation via bezier_spline function.
Published: 2025-04-23
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-4147-1 fig2dev security update
EUVD EUVD EUVD-2025-12159 In xfig diagramming tool, a stack-overflow while running fig2dev allows memory corruption via local input manipulation at the bezier_spline function.
History

Mon, 19 Jan 2026 04:00:00 +0000

Type Values Removed Values Added
CPEs cpe:/o:redhat:enterprise_linux:8 cpe:/a:redhat:enterprise_linux:8::crb
References

Thu, 15 Jan 2026 16:30:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:rhel_eus:9.6::crb
References

Thu, 15 Jan 2026 13:45:00 +0000

Type Values Removed Values Added
First Time appeared Redhat rhel Eus
CPEs cpe:/a:redhat:rhel_eus:9.4::crb
Vendors & Products Redhat rhel Eus
References

Thu, 15 Jan 2026 12:45:00 +0000

Type Values Removed Values Added
CPEs cpe:/o:redhat:enterprise_linux:9 cpe:/a:redhat:enterprise_linux:9::crb
References

Mon, 15 Dec 2025 19:45:00 +0000

Type Values Removed Values Added
CPEs cpe:/o:redhat:enterprise_linux:6
cpe:/o:redhat:enterprise_linux:7
cpe:/o:redhat:enterprise_linux:8
cpe:/o:redhat:enterprise_linux:9

Mon, 15 Dec 2025 19:00:00 +0000

Type Values Removed Values Added
CPEs cpe:/o:redhat:enterprise_linux:6
cpe:/o:redhat:enterprise_linux:7
cpe:/o:redhat:enterprise_linux:8
cpe:/o:redhat:enterprise_linux:9

Fri, 21 Nov 2025 12:00:00 +0000

Type Values Removed Values Added
Description In xfig diagramming tool, a stack-overflow while running fig2dev allows memory corruption via local input manipulation at the bezier_spline function. A flaw was found in xfig. This vulnerability allows possible code execution via local input manipulation via bezier_spline function.
Title Xfig: fig2dev stack-overflow Xfig: xfig: stack-overflow allows possible code execution via local input manipulation
Weaknesses CWE-120
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Fri, 21 Nov 2025 11:45:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N'}

cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


Mon, 03 Nov 2025 20:30:00 +0000

Type Values Removed Values Added
References

Tue, 21 Oct 2025 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Fig2dev Project
Fig2dev Project fig2dev
CPEs cpe:2.3:a:fig2dev_project:fig2dev:3.2.9a:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
Vendors & Products Fig2dev Project
Fig2dev Project fig2dev

Wed, 18 Jun 2025 15:00:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Moderate


Tue, 17 Jun 2025 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Redhat
Redhat enterprise Linux
CPEs cpe:/o:redhat:enterprise_linux:6
cpe:/o:redhat:enterprise_linux:7
cpe:/o:redhat:enterprise_linux:8
cpe:/o:redhat:enterprise_linux:9
Vendors & Products Redhat
Redhat enterprise Linux

Fri, 23 May 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 15 May 2025 11:45:00 +0000

Type Values Removed Values Added
Description Red Hat Product Security has come to the conclusion that this CVE is not needed. In xfig diagramming tool, a stack-overflow while running fig2dev allows memory corruption via local input manipulation at the bezier_spline function.
Title Xfig: fig2dev stack-overflow
Weaknesses CWE-121
References
Metrics cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N'}


Wed, 30 Apr 2025 18:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-121
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}


Wed, 30 Apr 2025 18:15:00 +0000

Type Values Removed Values Added
Title fig2dev stack-overflow
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 30 Apr 2025 17:30:00 +0000

Type Values Removed Values Added
Description Stack-overflow in fig2dev in version 3.2.9a allows an attacker possible code execution via local input manipulation via bezier_spline function. Red Hat Product Security has come to the conclusion that this CVE is not needed.

Thu, 24 Apr 2025 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 23 Apr 2025 21:15:00 +0000

Type Values Removed Values Added
Description Stack-overflow in fig2dev in version 3.2.9a allows an attacker possible code execution via local input manipulation via bezier_spline function.
Title fig2dev stack-overflow
Weaknesses CWE-121
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}


Subscriptions

Fig2dev Project Fig2dev
Redhat Enterprise Linux Rhel Eus
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2026-01-19T03:55:40.389Z

Reserved: 2025-04-23T20:32:36.306Z

Link: CVE-2025-46397

cve-icon Vulnrichment

Updated: 2025-11-03T20:04:27.187Z

cve-icon NVD

Status : Modified

Published: 2025-04-23T21:15:16.807

Modified: 2026-01-19T04:15:58.400

Link: CVE-2025-46397

cve-icon Redhat

Severity : Moderate

Publid Date: 2025-04-23T20:55:09Z

Links: CVE-2025-46397 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses