
Cloud Vulnerability DB
A community-led vulnerabilities database
A buffer overflow vulnerability was discovered in CDataMoji of the jwwlib component of LibreCAD 2.2.0-rc3 and older versions. The vulnerability was disclosed in December 2021 and allows attackers to achieve Remote Code Execution using a crafted JWW document (LibreCAD Issue, NVD).
The vulnerability exists in the CDataMoji entity deserialization at LibreCAD/libraries/jwwlib/src/jwwdoc.h. A char buf[512] declared in CDataMoji::Serialize() is of fixed size 512, and some varieties of CDataMoji provide their own size without bounds checking being performed. This allows an attacker to overflow the buffer and overwrite other stack variables, including the return address (LibreCAD Issue).
An attacker can craft a JW-CAD input file to gain control over execution flow (EIP controlled directly), allowing them to run arbitrary code on the system running LibreCAD with the privileges of the current user (LibreCAD Issue).
The vulnerability has been fixed in updated versions of LibreCAD. Various distributions have released security updates including Debian (2.1.3-1.3+deb11u1), Fedora, and Gentoo. The fix includes performing bounds checking in CDataMoji::Serialize() and refusing to load files that would overflow the buffer (Debian Security, Fedora Update).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."