FontForge GUtils SGI File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of FontForge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of scanlines within SGI files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-27920.
History

Wed, 07 Jan 2026 16:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:fontforge:fontforge:20251009:*:*:*:*:*:*:*

Mon, 05 Jan 2026 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Fontforge
Fontforge fontforge
Vendors & Products Fontforge
Fontforge fontforge

Thu, 01 Jan 2026 12:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

threat_severity

Important


Wed, 31 Dec 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 31 Dec 2025 07:15:00 +0000

Type Values Removed Values Added
Description FontForge GUtils SGI File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of FontForge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of scanlines within SGI files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-27920.
Title FontForge GUtils SGI File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability
Weaknesses CWE-122
References
Metrics cvssV3_0

{'score': 7.8, 'vector': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: zdi

Published: 2025-12-31T06:59:29.183Z

Updated: 2025-12-31T16:22:17.744Z

Reserved: 2025-12-29T20:02:11.712Z

Link: CVE-2025-15277

cve-icon Vulnrichment

Updated: 2025-12-31T16:22:14.712Z

cve-icon NVD

Status : Analyzed

Published: 2025-12-31T07:15:52.037

Modified: 2026-01-07T16:02:08.777

Link: CVE-2025-15277

cve-icon Redhat

Severity : Important

Publid Date: 2025-12-31T06:59:29Z

Links: CVE-2025-15277 - Bugzilla