
Cloud Vulnerability DB
A community-led vulnerabilities database
A global buffer overflow vulnerability exists in the shadeortintnameafterdeclarecolor function in genpstricks.c of fig2dev version 3.2.7b. The vulnerability allows attackers to cause a denial of service (DOS) by converting a xfig file into pstricks format (SourceForge Issue, NVD Database).
The vulnerability is classified as a classic buffer overflow (CWE-120) that occurs in the shadeortintnameafterdeclarecolor function at line 1135 of genpstricks.c. It has been assigned a CVSS v3.1 base score of 5.5 (Medium) with the vector string CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H, indicating local access, low attack complexity, no privileges required, and user interaction required (NVD Database).
The vulnerability primarily affects the availability of the system, potentially leading to denial of service conditions. When exploited, it can cause the application to crash through a global buffer overflow, disrupting normal operations (NVD Database).
The vulnerability has been fixed in subsequent versions of fig2dev. Users should upgrade to a version newer than 3.2.7b. The fix involves proper handling of tinted default colors in the pstricks output format (SourceForge Issue).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."