A flaw was found in xfig. This vulnerability allows possible code execution via local input manipulation via bezier_spline function.
References
| Link | Resource |
|---|---|
| https://access.redhat.com/security/cve/CVE-2025-46397 | Vendor Advisory |
| https://bugzilla.redhat.com/show_bug.cgi?id=2362058 | Vendor Advisory |
| https://sourceforge.net/p/mcj/tickets/192/ | Exploit Issue Tracking |
| https://lists.debian.org/debian-lts-announce/2025/04/msg00043.html |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2025, 12:15
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
| CWE | CWE-120 | |
| Summary | (en) A flaw was found in xfig. This vulnerability allows possible code execution via local input manipulation via bezier_spline function. |
03 Nov 2025, 20:19
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Information
Published : 2025-04-23 21:15
Updated : 2025-11-21 12:15
NVD link : CVE-2025-46397
Mitre link : CVE-2025-46397
CVE.ORG link : CVE-2025-46397
JSON object : View
Products Affected
redhat
- enterprise_linux
fig2dev_project
- fig2dev
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
