{"api_version":"1","generated_at":"2026-04-21T13:31:56+00:00","cve":"CVE-2020-25690","urls":{"html":"https://cve.report/CVE-2020-25690","api":"https://cve.report/api/cve/CVE-2020-25690.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2020-25690","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2020-25690"},"summary":{"title":"CVE-2020-25690","description":"An out-of-bounds write flaw was found in FontForge in versions before 20200314 while parsing SFD files containing certain LayerCount tokens. This flaw allows an attacker to manipulate the memory allocated on the heap, causing the application to crash or execute arbitrary code. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.","state":"PUBLIC","assigner":"secalert@redhat.com","published_at":"2021-02-23 04:15:00","updated_at":"2021-03-01 21:19:00"},"problem_types":["CWE-119"],"metrics":[],"references":[{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1893188","name":"https://bugzilla.redhat.com/show_bug.cgi?id=1893188","refsource":"MISC","tags":["Issue Tracking","Patch","Third Party Advisory"],"title":"1893188 – (CVE-2020-25690) CVE-2020-25690 fontforge: SFD_GetFontMetaData() insufficient CVE-2020-5395 backport","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2020-25690","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-25690","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2020","cve_id":"25690","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"fontforge","cpe5":"fontforge","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"25690","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"fontforge","cpe5":"fontforge","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2020-25690","qid":"750532","title":"OpenSUSE Security Update for font (openSUSE-SU-2020:2111-1)"},{"cve":"CVE-2020-25690","qid":"940179","title":"AlmaLinux Security Update for fontforge (ALSA-2020:4844)"}]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2020-25690","ASSIGNER":"secalert@redhat.com","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"n/a","product":{"product_data":[{"product_name":"fontforge","version":{"version_data":[{"version_value":"fontforge before 20200314"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-119"}]}]},"references":{"reference_data":[{"refsource":"MISC","name":"https://bugzilla.redhat.com/show_bug.cgi?id=1893188","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1893188"}]},"description":{"description_data":[{"lang":"eng","value":"An out-of-bounds write flaw was found in FontForge in versions before 20200314 while parsing SFD files containing certain LayerCount tokens. This flaw allows an attacker to manipulate the memory allocated on the heap, causing the application to crash or execute arbitrary code. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability."}]}},"nvd":{"publishedDate":"2021-02-23 04:15:00","lastModifiedDate":"2021-03-01 21:19:00","problem_types":["CWE-119"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":6.8},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:fontforge:fontforge:*:*:*:*:*:*:*:*","versionEndExcluding":"20200314","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2020","CveId":"25690","Ordinal":"187107","Title":"CVE-2020-25690","CVE":"CVE-2020-25690","Year":"2020"},"notes":[{"CveYear":"2020","CveId":"25690","Ordinal":"1","NoteData":"An out-of-bounds write flaw was found in FontForge in versions before 20200314 while parsing SFD files containing certain LayerCount tokens. This flaw allows an attacker to manipulate the memory allocated on the heap, causing the application to crash or execute arbitrary code. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.","Type":"Description","Title":null},{"CveYear":"2020","CveId":"25690","Ordinal":"2","NoteData":"2021-02-22","Type":"Other","Title":"Published"},{"CveYear":"2020","CveId":"25690","Ordinal":"3","NoteData":"2021-02-22","Type":"Other","Title":"Modified"}]}}}