Impact
A stack-based buffer overflow occurs in Panda3D’s egg‑mkfont utility when an attacker supplies an overly long glyph pattern to the -gp option. The utility formats this input into a fixed‑size buffer using an unbounded sprintf, corrupting adjacent memory and causing a deterministic crash. Depending on build configuration and the execution environment, this overflow may also be leveraged to execute arbitrary code.
Affected Systems
The flaw affects Panda3D versions up to and including 1.10.16. Any system running those releases and using the egg‑mkfont tool is vulnerable, regardless of the host platform or operating system.
Risk and Exploitability
The CVSS base score is 6.9, indicating moderate severity. The EPSS score is below 1%, suggesting a low probability of exploitation in the near term. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires that an attacker can provide a malicious glyph pattern to egg‑mkfont, which is typically a local or remote execution scenario where the tool is run with higher privileges or on behalf of a user carrying out game asset creation.
OpenCVE Enrichment