Vigil@nce - Vigil@nce - fig2dev: buffer overflow via set_fill, analyzed on 17/09/2021
November 2021 by Vigil@nce
Vigil@nce - An attacker can trigger a buffer overflow via set_fill() of fig2dev, in order to trigger a denial of service, and possibly to run code.
Plus d'information sur : https://vigilance.fr/vulnerability/fig2dev-buffer-overflow-via-set-fill-36450