[prev in list] [next in list] [prev in thread] [next in thread] 

List:       bugtraq
Subject:    Buffer overflows in Dia XFig import
From:       lars () raeder ! dk
Date:       2006-03-29 21:27:42
Message-ID: 20060329212742.17764.qmail () securityfocus ! com
[Download RAW message or body]

A security review kindly performed by infamous41md has turned up three buffer \
overflow vulnerabilities in the XFig import plug-in in Dia, a diagramming tool for \
Gtk that runs on both Winddows and Unix.  While the XFig format is not the native \
format of Dia, a specially crafted XFig file could cause arbitrary code execution \
*if* loaded into Dia.

The vulnerabilities affect versions 0.87 through 0.94 as well as prereleases 1-5 of \
0.95, after which it is fixed in the source and later prereleases.  A patch against \
the 0.94 release has been attached to the announcement on the dia-list at \
http://mail.gnome.org/archives/dia-list/2006-March/msg00149.html

-Lars Clausen
Head Dia maintainer


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic