Vulnerability Details : CVE-2024-25081
Splinefont in FontForge through 20230101 allows command injection via crafted filenames.
Products affected by CVE-2024-25081
- cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*
- cpe:2.3:a:fontforge:fontforge:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2024-25081
0.03%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 6 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2024-25081
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.2
|
MEDIUM | CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L |
0.8
|
3.4
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 2024-08-27 |
CWE ids for CVE-2024-25081
-
The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.Assigned by: 134c704f-9b21-4f2e-91b3-4a467353bcc0 (Secondary)
References for CVE-2024-25081
-
https://github.com/fontforge/fontforge/pull/5367
Fix Splinefont shell invocation by pkvanca · Pull Request #5367 · fontforge/fontforge · GitHubPatch
-
http://www.openwall.com/lists/oss-security/2024/03/08/2
oss-security - Vulnerabilties in FontTools & FontForgeThird Party Advisory;Mailing List
-
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GCH22HIO2C6M4BZWF5EYIWVFBXL5BQAH/
[SECURITY] Fedora 40 Update: fontforge-20230101-11.fc40 - package-announce - Fedora Mailing-ListsIssue Tracking;Mailing List
-
https://fontforge.org/en-US/downloads/
Download FontForgeProduct
-
https://lists.debian.org/debian-lts-announce/2024/03/msg00007.html
[SECURITY] [DLA 3754-1] fontforge security updateMailing List;Third Party Advisory
Jump to