fig2dev is vulnerable to Denial Of Service (DoS). The vulnerability exists due to the stack-based buffer overflow in the read_textobject
function of read.c
, allowing an attacker to cause an application crash by passing incorrect sscanf
CPE | Name | Operator | Version |
---|---|---|---|
fig2dev:bionic | eq | 1:3.2.6a-6ubuntu1 | |
fig2dev:bionic | eq | 1:3.2.6a-6ubuntu1 |