CVE-2017-16899

NameCVE-2017-16899
DescriptionAn array index error in the fig2dev program in Xfig 3.2.6a allows remote attackers to cause a denial-of-service attack or information disclosure with a maliciously crafted Fig format file, related to a negative font value in dev/gentikz.c, and the read_textobject functions in read.c and read1_3.c.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium
Debian Bugs881143

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
fig2dev (PTS)stretch1:3.2.6a-2+deb9u3fixed
buster1:3.2.7a-5+deb10u3fixed
bullseye, sid1:3.2.8-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
fig2devsourcestretch1:3.2.6a-2+deb9u1
fig2devsource(unstable)1:3.2.6a-5881143
transfigsourcejessie1:3.2.5.e-4+deb8u1
transfigsource(unstable)(unfixed)

Notes

[wheezy] - transfig <no-dsa> (Minor issue)

Search for package or bug name: Reporting problems