{"id":"CVE-2017-11575","details":"FontForge 20161012 is vulnerable to a buffer over-read in strnmatch (char.c) resulting in DoS or code execution via a crafted otf file, related to a call from the readttfcopyrights function in parsettf.c.","modified":"2026-04-16T01:44:46.916308692Z","published":"2017-07-23T22:29:00.447Z","related":["SUSE-SU-2019:2236-1"],"references":[{"type":"ADVISORY","url":"http://www.debian.org/security/2017/dsa-3958"},{"type":"FIX","url":"https://github.com/fontforge/fontforge/issues/3096"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/fontforge/fontforge","events":[{"introduced":"0"},{"last_affected":"fe1d84b7d05178885a36ba0adce0559a82a493d5"}],"database_specific":{"cpe":"cpe:2.3:a:fontforge:fontforge:20161012:*:*:*:*:*:*:*","extracted_events":[{"introduced":"0"},{"last_affected":"20161012"}],"source":"CPE_FIELD"}}],"versions":["2.0.20140101","20141013","20141014","20141126","20141230","20150228","20150330","20150430","20150612","20150824","20160403","20160404","20160930","20161001","20161004","20161005","20161012","v2.1.0","v20110222","v20120731-b"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-11575.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}