CVE-2025-15273

NameCVE-2025-15273
DescriptionFontForge PFB File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of FontForge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PFB files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-28546.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1124487

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
fontforge (PTS)bullseye (security), bullseye1:20201107~dfsg-4+deb11u1vulnerable
bookworm, bookworm (security)1:20230101~dfsg-1.1~deb12u1vulnerable
trixie1:20230101~dfsg-4vulnerable
forky, sid1:20230101~dfsg-8vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
fontforgesource(unstable)(unfixed)1124487

Notes

https://www.zerodayinitiative.com/advisories/ZDI-25-1191/

Search for package or bug name: Reporting problems