{"id":"CVE-2016-9829","details":"Heap-based buffer overflow in the parseSWF_DEFINEFONT function in parser.c in the listswf tool in libming 0.4.7 allows remote attackers to have unspecified impact via a crafted SWF file.","modified":"2026-04-16T06:25:32.274345444Z","published":"2017-02-17T02:59:14.157Z","references":[{"type":"WEB","url":"http://www.securityfocus.com/bid/95133"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2016/12/05/4"},{"type":"EVIDENCE","url":"https://blogs.gentoo.org/ago/2016/12/01/libming-listswf-heap-based-buffer-overflow-in-parseswf_definefont-parser-c/"},{"type":"EVIDENCE","url":"http://www.openwall.com/lists/oss-security/2016/12/01/5"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/libming/libming","events":[{"introduced":"0"},{"last_affected":"6f91d1aa8f2351c2226020df015d3f05e453f3ee"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"0.4.7"}]}}],"versions":["ming-0_3_0","ming-0_3_beta2","ming-0_4_0_beta3","ming-0_4_0_beta4","ming-0_4_0_beta5","ming-0_4_0_rc1","ming-0_4_0_rc2","ming-0_4_3","ming-0_4_4","ming-0_4_5","ming-0_4_6","ming-0_4_7"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-9829.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}