Lucene search

K
gentooGentoo FoundationGLSA-200604-14
HistoryApr 23, 2006 - 12:00 a.m.

Dia: Arbitrary code execution through XFig import

2006-04-2300:00:00
Gentoo Foundation
security.gentoo.org
5

7.6 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:H/Au:N/C:C/I:C/A:C

0.013 Low

EPSS

Percentile

85.8%

Background

Dia is a GTK+ based diagram creation program.

Description

infamous41md discovered multiple buffer overflows in Dia’s XFig file import plugin.

Impact

By enticing a user to import a specially crafted XFig file into Dia, an attacker could exploit this issue to execute arbitrary code with the rights of the user running Dia.

Workaround

There is no known workaround at this time.

Resolution

All Dia users should upgrade to the latest available version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=app-office/dia-0.94-r5"
OSVersionArchitecturePackageVersionFilename
Gentooanyallapp-office/dia< 0.94-r5UNKNOWN

7.6 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:H/Au:N/C:C/I:C/A:C

0.013 Low

EPSS

Percentile

85.8%