Published:2024/08/28  Last Updated:2024/08/28

JVNVU#96498690
xfpt vulnerable to stack-based buffer overflow

Overview

xfpt contains a stack-based buffer overflow vulnerability.

Products Affected

  • xfpt versions prior to 1.01

Description

xfpt fails to handle appropriately some parameters inside the input data, resulting in a stack-based buffer overflow vulnerability (CWE-121).

Impact

When a user of the affected product is tricked to process a specially crafted file, arbitrary code may be executed on the user's environment.

Solution

Update the software
Update the software to the latest version according to the information provided by the developer.
The developer has commited the fix in xfpt repository, which will be incorporated to the next version 1.01.

References

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

CVSS v3 CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Base Score: 7.0
Attack Vector(AV) Physical (P) Local (L) Adjacent (A) Network (N)
Attack Complexity(AC) High (H) Low (L)
Privileges Required(PR) High (H) Low (L) None (N)
User Interaction(UI) Required (R) None (N)
Scope(S) Unchanged (U) Changed (C)
Confidentiality Impact(C) None (N) Low (L) High (H)
Integrity Impact(I) None (N) Low (L) High (H)
Availability Impact(A) None (N) Low (L) High (H)

Comment

AC(Attack Complexity) is evaluated as High considering that exploit protection mechanisms such as ASLR and stack canaries become popular in major OS environments.

Credit

Yuhei Kawakoya of NTT Security Holdings Corporation reported this vulnerability to JPCERT/CC.
JPCERT/CC coordinated with the developer.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE CVE-2024-43700
JVN iPedia