JVNVU#96498690
xfpt vulnerable to stack-based buffer overflow
Overview
xfpt contains a stack-based buffer overflow vulnerability.
Products Affected
- xfpt versions prior to 1.01
Description
xfpt fails to handle appropriately some parameters inside the input data, resulting in a stack-based buffer overflow vulnerability (CWE-121).
Impact
When a user of the affected product is tricked to process a specially crafted file, arbitrary code may be executed on the user's environment.
Solution
Update the software
Update the software to the latest version according to the information provided by the developer.
The developer has commited the fix in xfpt repository, which will be incorporated to the next version 1.01.
Vendor Status
Vendor | Link |
Philip Hazel | GitHub xfpt |
Commit a690304: Diagnose error if macro expansion makes a line too long for its buffer |
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
Attack Vector(AV) | Physical (P) | Local (L) | Adjacent (A) | Network (N) |
---|---|---|---|---|
Attack Complexity(AC) | High (H) | Low (L) | ||
Privileges Required(PR) | High (H) | Low (L) | None (N) | |
User Interaction(UI) | Required (R) | None (N) | ||
Scope(S) | Unchanged (U) | Changed (C) | ||
Confidentiality Impact(C) | None (N) | Low (L) | High (H) | |
Integrity Impact(I) | None (N) | Low (L) | High (H) | |
Availability Impact(A) | None (N) | Low (L) | High (H) |
Comment
AC(Attack Complexity) is evaluated as High considering that exploit protection mechanisms such as ASLR and stack canaries become popular in major OS environments.
Credit
Yuhei Kawakoya of NTT Security Holdings Corporation reported this vulnerability to JPCERT/CC.
JPCERT/CC coordinated with the developer.
Other Information
JPCERT Alert |
|
JPCERT Reports |
|
CERT Advisory |
|
CPNI Advisory |
|
TRnotes |
|
CVE |
CVE-2024-43700 |
JVN iPedia |
|