
Cloud Vulnerability DB
A community-led vulnerabilities database
A global buffer overflow vulnerability was identified in fig2dev version 3.2.7b, specifically in the genmpwritefontmacrolatex component within genmp.c. The vulnerability was assigned CVE-2020-21678 and was discovered in 2020 (CVE Details, MITRE CVE).
The vulnerability is a global buffer overflow that occurs when converting a xfig file into mp format. The issue specifically manifests in the genmpwritefontmacrolatex function at line 1274 of genmp.c. The vulnerability has been assigned a CVSS v3.1 Base Score of 5.5 (Medium) with the vector string CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H. The vulnerability is classified as CWE-120: Buffer Copy without Checking Size of Input (NVD).
When exploited, this vulnerability allows attackers to cause a denial of service (DOS) condition in the system. The impact is primarily focused on system availability, with no direct impact on confidentiality or integrity (NVD).
The vulnerability was fixed in later versions of fig2dev. The fix was implemented through commit [d70e4b] as documented in the project's source repository (SourceForge Ticket).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."