xfpt versions prior to 1.01 fails to handle appropriately some parameters inside the input data, resulting in a stack-based buffer overflow vulnerability. When a user of the affected product is tricked to process a specially crafted file, arbitrary code may be executed on the user's environment.
Metrics
Affected Vendors & Products
References
History
Sat, 30 Nov 2024 12:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Tue, 15 Oct 2024 15:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-121 |
Tue, 15 Oct 2024 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-120 |
Fri, 06 Sep 2024 23:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-787 |
Thu, 29 Aug 2024 20:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Philiphazel
Philiphazel xfpt |
|
Weaknesses | CWE-121 | |
CPEs | cpe:2.3:a:philiphazel:xfpt:*:*:*:*:*:*:*:* | |
Vendors & Products |
Philiphazel
Philiphazel xfpt |
|
Metrics |
cvssV3_1
|
Thu, 29 Aug 2024 07:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | xfpt versions prior to 1.01 fails to handle appropriately some parameters inside the input data, resulting in a stack-based buffer overflow vulnerability. When a user of the affected product is tricked to process a specially crafted file, arbitrary code may be executed on the user's environment. | |
References |
|
MITRE
Status: PUBLISHED
Assigner: jpcert
Published: 2024-08-29T07:36:13.470Z
Updated: 2024-11-30T12:04:00.620Z
Reserved: 2024-08-15T06:21:14.760Z
Link: CVE-2024-43700
Vulnrichment
Updated: 2024-11-30T12:04:00.620Z
NVD
Status : Modified
Published: 2024-08-29T11:15:26.757
Modified: 2024-11-30T12:15:17.720
Link: CVE-2024-43700
Redhat
No data.