Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-46397: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

0
High
VulnerabilityCVE-2025-46397cvecve-2025-46397
Published: Wed Apr 23 2025 (04/23/2025, 20:55:09 UTC)
Source: CVE

Description

A flaw was found in xfig. This vulnerability allows possible code execution via local input manipulation via bezier_spline function.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 14:05:53 UTC

Technical Analysis

CVE-2025-46397 is a classic buffer overflow vulnerability identified in the xfig application, a widely used vector graphics editor for Unix-like systems. The flaw resides in the bezier_spline function, where input data is copied into a buffer without proper size validation, leading to a buffer overflow condition. This unchecked buffer copy can allow an attacker with local access and low privileges to overwrite memory, potentially enabling arbitrary code execution. The vulnerability does not require user interaction, increasing its risk in environments where local users have access to the system. The CVSS v3.1 base score of 7.8 reflects high impact on confidentiality, integrity, and availability, with attack vector local, low attack complexity, and privileges required at a low level. Although no public exploits are currently known, the nature of the vulnerability suggests that exploit development could be straightforward for skilled attackers. The vulnerability affects all versions of xfig prior to the fix, though specific affected versions are not detailed. Given xfig’s use in academic, engineering, and graphical design environments, exploitation could lead to unauthorized code execution, data compromise, or denial of service on affected systems.

Potential Impact

The impact of CVE-2025-46397 is significant for organizations using xfig, particularly in environments where local user access is common. Successful exploitation can lead to full system compromise due to arbitrary code execution, affecting confidentiality by exposing sensitive data, integrity by allowing unauthorized modifications, and availability by causing crashes or denial of service. This is especially critical in multi-user systems, shared academic or research environments, and development workstations where xfig is installed. The requirement for local access limits remote exploitation but does not eliminate risk in environments with multiple users or where attackers have gained initial footholds. The lack of user interaction requirement increases the likelihood of automated or stealthy exploitation once local access is obtained. Organizations relying on xfig for graphical editing should consider the risk of lateral movement or privilege escalation stemming from this vulnerability.

Mitigation Recommendations

To mitigate CVE-2025-46397, organizations should: 1) Monitor vendor channels closely and apply patches or updates for xfig immediately upon release. 2) Restrict local access to systems running xfig to trusted users only, employing strict user account management and least privilege principles. 3) Use application whitelisting or sandboxing techniques to limit the execution context of xfig and reduce potential damage from exploitation. 4) Employ runtime protection tools such as Address Space Layout Randomization (ASLR) and Data Execution Prevention (DEP) to hinder exploitation of buffer overflows. 5) Conduct regular audits of local user activities and monitor for anomalous behavior related to xfig processes. 6) Consider disabling or uninstalling xfig on systems where it is not essential. 7) Educate users about the risks of running untrusted input through xfig and enforce policies to prevent execution of unverified files. These measures, combined with timely patching, will reduce the risk posed by this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-04-23T20:32:36.306Z
Cisa Enriched
false
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fb1484d88663aec773

Added to database: 5/20/2025, 6:59:07 PM

Last enriched: 2/27/2026, 2:05:53 PM

Last updated: 3/24/2026, 2:54:41 PM

Views: 70

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses