Stack-based buffer overflow vulnerability in XFPT products
CVE-2024-43700

7.8HIGH

Key Information:

Status
Vendor
CVE Published:
29 August 2024

Summary

The vulnerability in xfpt affects versions prior to 1.01 and arises from improper handling of specific parameters within user input data. It may lead to a stack-based buffer overflow, allowing an attacker to craft a malicious file that, when processed by an unsuspecting user, results in the execution of arbitrary code within the user's environment. This flaw emphasizes the critical need for robust input validation mechanisms in software development.

Affected Version(s)

xfpt prior to 1.01

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.