CVE-2021-3561
Published on: 05/26/2021 12:00:00 AM UTC
Last Modified on: 02/12/2023 11:41:00 PM UTC
Certain versions of Debian Linux from Debian contain the following vulnerability:
An Out of Bounds flaw was found fig2dev version 3.2.8a. A flawed bounds check in read_objects() could allow an attacker to provide a crafted malicious input causing the application to either crash or in some cases cause memory corruption. The highest threat from this vulnerability is to integrity as well as system availability.
- CVE-2021-3561 has been assigned by
[email protected] to track the vulnerability - currently rated as HIGH severity.
CVSS3 Score: 7.1 - HIGH
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
LOCAL | LOW | NONE | REQUIRED |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | NONE | HIGH | HIGH |
CVSS2 Score: 5.8 - MEDIUM
Access Vector ⓘ |
Access Complexity |
Authentication |
---|---|---|
NETWORK | MEDIUM | NONE |
Confidentiality Impact |
Integrity Impact |
Availability Impact |
NONE | PARTIAL | PARTIAL |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
[SECURITY] Fedora 33 Update: transfig-3.2.8a-2.fc33 - package-announce - Fedora Mailing-Lists | lists.fedoraproject.org text/html |
![]() |
[SECURITY] Fedora 34 Update: transfig-3.2.8a-2.fc34 - package-announce - Fedora Mailing-Lists | lists.fedoraproject.org text/html |
![]() |
Xfig / Tickets / #116 [Security] global-buffer-overflow of fig2dev/read.c in function read_objects | sourceforge.net text/html |
![]() |
[SECURITY] [DLA 2778-1] fig2dev security update | lists.debian.org text/html |
![]() |
1955675 – (CVE-2021-3561) CVE-2021-3561 fig2dev: Global buffer overflow in fig2dev/read.c in function read_objects | bugzilla.redhat.com text/html |
![]() |
Xfig / fig2dev / Commit [6827c0] | sourceforge.net text/html |
![]() |
Related QID Numbers
- 178818 Debian Security Update for fig2dev (DLA 2778-1)
- 179524 Debian Security Update for fig2dev (CVE-2021-3561)
- 199172 Ubuntu Security Notification for Fig2dev Vulnerabilities (USN-5864-1)
- 281489 Fedora Security Update for transfig (FEDORA-2021-b71f405f40)
- 281490 Fedora Security Update for transfig (FEDORA-2021-dab56300b1)
- 352455 Amazon Linux Security Advisory for transfig: ALAS2-2021-1682
- 750886 OpenSUSE Security Update for transfig (openSUSE-SU-2021:2454-1)
- 750948 OpenSUSE Security Update for transfig (openSUSE-SU-2021:1143-1)
- 751142 SUSE Enterprise Linux Security Update for transfig (SUSE-SU-2021:3124-1)
Exploit/POC from Github
An Out of Bounds flaw was found fig2dev version 3.2.8a. A flawed bounds check in read_objects() could allow an attack…
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Operating System | Debian | Debian Linux | 9.0 | All | All | All |
Operating System | Fedoraproject | Fedora | 33 | All | All | All |
Operating System | Fedoraproject | Fedora | 34 | All | All | All |
Application | Fig2dev Project | Fig2dev | 3.2.8 | a | All | All |
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*:
- cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*:
- cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*:
- cpe:2.3:a:fig2dev_project:fig2dev:3.2.8:a:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
CVE-2021-3561 : An Out of Bounds flaw was found fig2dev version 3.2.8a. A flawed bounds check in read_objects cou… twitter.com/i/web/status/1… | 2021-05-26 22:07:21 |
![]() |
CVE-2021-3561 | 2021-05-26 22:41:41 |