Lucene search

K
gentooGentoo FoundationGLSA-200606-03
HistoryJun 07, 2006 - 12:00 a.m.

Dia: Format string vulnerabilities

2006-06-0700:00:00
Gentoo Foundation
security.gentoo.org
13

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.025 Low

EPSS

Percentile

90.3%

Background

Dia is a GTK+ based diagram creation program.

Description

KaDaL-X discovered a format string error within the handling of filenames. Hans de Goede also discovered several other format string errors in the processing of dia files.

Impact

By enticing a user to open a specially crafted file, a remote attacker could exploit these vulnerabilities to execute arbitrary code with the rights of the user running the application.

Workaround

There is no known workaround at this time.

Resolution

All Dia users should upgrade to the latest available version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=app-office/dia-0.95.1"
OSVersionArchitecturePackageVersionFilename
Gentooanyallapp-office/dia< 0.95.1UNKNOWN

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.025 Low

EPSS

Percentile

90.3%