CVE-2017-11576

EUVD-2017-3191
FontForge 20161012 does not ensure a positive size in a weight vector memcpy call in readcfftopdict (parsettf.c) resulting in DoS via a crafted otf file.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5.5 MEDIUM
LOCAL
LOW
NONE
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Awaiting analysis
This vulnerability is currently awaiting analysis.
Base Score
CVSS 3.x
EPSS Score
Percentile: 47%
Debian logo
Debian Releases
Debian Product
Codename
fontforge
bookworm
1:20230101~dfsg-1.1~deb12u1
fixed
bookworm (security)
1:20230101~dfsg-1.1~deb12u1
fixed
bullseye
1:20201107~dfsg-4+deb11u1
fixed
bullseye (security)
1:20201107~dfsg-4+deb11u1
fixed
sid
1:20230101~dfsg-4
fixed
trixie
1:20230101~dfsg-4
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
fontforge
artful
ignored
bionic
not-affected
cosmic
not-affected
trusty
Fixed 20120731.b-5ubuntu0.1
released
xenial
Fixed 20120731.b-7.1ubuntu0.1
released
zesty
ignored