{"id":"CVE-2021-32436","details":"An out-of-bounds read in the function write_title() in subs.c of abcm2ps v8.14.11 allows remote attackers to cause a Denial of Service (DoS) via unspecified vectors.","modified":"2026-04-16T04:31:03.368645706Z","published":"2022-03-10T17:42:14.683Z","related":["openSUSE-SU-2022:0100-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTF4FXCW22FFB5HNQO3GK3F4FFBLTZKE/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6333SXWMES3K22DBAOAW34G6EU6WIJEY/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EVGJH4HMXI3TWMHQJQCG3M7KSXJWJM7R/"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2022/04/msg00015.html"},{"type":"FIX","url":"https://github.com/leesavide/abcm2ps/commit/2f56e1179cab6affeb8afa9d6c324008fe40d8e3"},{"type":"FIX","url":"https://github.com/leesavide/abcm2ps/issues/85"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/leesavide/abcm2ps","events":[{"introduced":"0"},{"last_affected":"76e60bab588aedd1dbc78029ee30ab5c7c4f6728"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"8.14.11"}]}},{"type":"GIT","repo":"https://github.com/lewdlime/abcm2ps","events":[{"introduced":"0"},{"fixed":"2f56e1179cab6affeb8afa9d6c324008fe40d8e3"}]}],"versions":["abcm2ps-1.6.12","abcm2ps-2.11.3","abcm2ps-3.7.21","abcm2ps-4.12.30","abcm2ps-5.9.25","abcm2ps-6.6.22","abcm2ps-7.8.14","abcm2ps-8.11.5","abcm2ps-8.11.7","abcm2ps-8.12.1","abcm2ps-8.12.4","abcm2ps-8.12.8","abcm2ps-8.12.9","abcm2ps-8.13.0","abcm2ps-8.13.1","abcm2ps-8.13.10","abcm2ps-8.13.11","abcm2ps-8.13.12","abcm2ps-8.13.13","abcm2ps-8.13.2","abcm2ps-8.13.3","abcm2ps-8.13.4","abcm2ps-8.13.5","abcm2ps-8.13.7","abcm2ps-8.13.8","abcm2ps-8.13.9","v8.13.14","v8.13.15","v8.13.16","v8.13.17","v8.13.18","v8.13.19","v8.13.20","v8.13.21","v8.13.22","v8.13.23","v8.13.24","v8.14.0","v8.14.1","v8.14.10","v8.14.11","v8.14.2","v8.14.3","v8.14.4","v8.14.5","v8.14.6","v8.14.7","v8.14.8","v8.14.9"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"34"}]},{"events":[{"introduced":"0"},{"last_affected":"35"}]},{"events":[{"introduced":"0"},{"last_affected":"36"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-32436.json","vanir_signatures_modified":"2026-04-11T17:12:52Z","vanir_signatures":[{"deprecated":false,"source":"https://github.com/lewdlime/abcm2ps/commit/2f56e1179cab6affeb8afa9d6c324008fe40d8e3","digest":{"threshold":0.9,"line_hashes":["251497682872655175925897519657787096445","170539121042606910713589242252026695020","328227602076514369291620605302779708288","276032116500668709550285857677238870801","250589683462609108789630282092401945904","153075066231536319052908485446816824661"]},"signature_version":"v1","target":{"file":"parse.c"},"signature_type":"Line","id":"CVE-2021-32436-826e4fa5"},{"deprecated":false,"source":"https://github.com/lewdlime/abcm2ps/commit/2f56e1179cab6affeb8afa9d6c324008fe40d8e3","digest":{"function_hash":"135299979708671967523040369635494941768","length":2910},"signature_version":"v1","target":{"file":"parse.c","function":"get_over"},"signature_type":"Function","id":"CVE-2021-32436-dfdc7dea"}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}