Stack-based buffer overflow vulnerability in XFPT products
CVE-2024-43700
7.8HIGH
Summary
The vulnerability in xfpt affects versions prior to 1.01 and arises from improper handling of specific parameters within user input data. It may lead to a stack-based buffer overflow, allowing an attacker to craft a malicious file that, when processed by an unsuspecting user, results in the execution of arbitrary code within the user's environment. This flaw emphasizes the critical need for robust input validation mechanisms in software development.
Affected Version(s)
xfpt prior to 1.01
References
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved