A code execution vulnerability exists in the DL_Dxf::handleLWPolylineData functionality of Ribbonsoft dxflib 3.17.0. A specially-crafted .dxf file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.
References
| Link | Resource |
|---|---|
| https://talosintelligence.com/vulnerability_reports/TALOS-2021-1346 | Exploit Third Party Advisory |
| https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DA4C4X5GMM65VYLUW7Q7YL6P5NDB633A/ | Mailing List Third Party Advisory |
| https://lists.debian.org/debian-lts-announce/2022/06/msg00008.html | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2021-09-08 16:15
Updated : 2022-07-28 10:38
NVD link : CVE-2021-21897
Mitre link : CVE-2021-21897
JSON object : View
Products Affected
fedoraproject
- extra_packages_for_enterprise_linux
- fedora
ribbonsoft
- dxflib
debian
- debian_linux
CWE
CWE-787
Out-of-bounds Write
