[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

MDVSA-2011:010 -- Mandriva xfig

ID: oval:org.secpod.oval:def:301128Date: (C)2012-01-07   (M)2021-06-02
Class: PATCHFamily: unix




Multiple vulnerabilities has been found and corrected in xfig: Stack-based buffer overflow in the read_1_3_textobject function in f_readold.c in Xfig 3.2.5b and earlier, and in the read_textobject function in read1_3.c in fig2dev in Transfig 3.2.5a and earlier, allows remote attackers to execute arbitrary code via a long string in a malformed .fig file that uses the 1.3 file format. NOTE: some of these details are obtained from third party information . Stack consumption vulnerability in u_bound.c in Xfig 3.2.5b and earlier allows remote attackers to cause a denial of service via a long string in a malformed .fig file that uses the 1.3 file format, possibly related to the readfp_fig function in f_read.c . Stack-based buffer overflow in Xfig 3.2.4 and 3.2.5 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a FIG image with a crafted color definition . Packages for 2009.0 are provided as of the Extended Maintenance Program

Platform:
Mandriva Linux 2010.0
Mandriva Linux 2010.1
Mandriva Linux 2009.0
Product:
xfig
Reference:
MDVSA-2011:010
CVE-2010-4262
CVE-2009-4228
CVE-2009-4227
CVE    3
CVE-2009-4228
CVE-2009-4227
CVE-2010-4262
CPE    3
cpe:/o:mandriva:linux:2009.0
cpe:/o:mandriva:linux:2010.1
cpe:/o:mandriva:linux:2010.0

© SecPod Technologies