DIA XFIG File Import Multiple Remote Buffer Overflow Vulnerabilities
BID:17310
Info
DIA XFIG File Import Multiple Remote Buffer Overflow Vulnerabilities
| Bugtraq ID: | 17310 |
| Class: | Boundary Condition Error |
| CVE: |
CVE-2006-1550 |
| Remote: | Yes |
| Local: | No |
| Published: | Mar 29 2006 12:00AM |
| Updated: | Dec 07 2006 10:24PM |
| Credit: | Discovery is credited to infamous41md. |
| Vulnerable: |
Ubuntu Ubuntu Linux 5.10 powerpc Ubuntu Ubuntu Linux 5.10 i386 Ubuntu Ubuntu Linux 5.10 amd64 Ubuntu Ubuntu Linux 5.0 4 powerpc Ubuntu Ubuntu Linux 5.0 4 i386 Ubuntu Ubuntu Linux 5.0 4 amd64 Ubuntu Ubuntu Linux 4.1 ppc Ubuntu Ubuntu Linux 4.1 ia64 Ubuntu Ubuntu Linux 4.1 ia32 S.u.S.E. Novell Linux Desktop 9.0 S.u.S.E. Linux Professional 10.0 OSS S.u.S.E. Linux Professional 10.0 S.u.S.E. Linux Professional 9.3 x86_64 S.u.S.E. Linux Professional 9.3 S.u.S.E. Linux Professional 9.2 x86_64 S.u.S.E. Linux Professional 9.2 S.u.S.E. Linux Personal 10.0 OSS S.u.S.E. Linux Personal 9.3 x86_64 S.u.S.E. Linux Personal 9.3 S.u.S.E. Linux Personal 9.2 x86_64 S.u.S.E. Linux Personal 9.2 Redhat Fedora Core4 Redhat Enterprise Linux WS 4 Redhat Enterprise Linux WS 2.1 IA64 Redhat Enterprise Linux WS 2.1 Redhat Enterprise Linux ES 4 Redhat Enterprise Linux ES 2.1 IA64 Redhat Enterprise Linux ES 2.1 Redhat Enterprise Linux AS 4 Redhat Enterprise Linux AS 2.1 IA64 Redhat Enterprise Linux AS 2.1 Redhat Desktop 4.0 Redhat Advanced Workstation for the Itanium Processor 2.1 IA64 Redhat Advanced Workstation for the Itanium Processor 2.1 Mandriva Linux Mandrake 2006.0 x86_64 Mandriva Linux Mandrake 2006.0 MandrakeSoft Corporate Server 3.0 x86_64 MandrakeSoft Corporate Server 3.0 Gentoo Linux DIA DIA 0.92.2 DIA DIA 0.88.1 DIA DIA 0.94 DIA DIA 0.93 DIA DIA 0.91 DIA DIA 0.87 |
| Not Vulnerable: |
DIA DIA 0.95-pre6 |
Discussion
DIA XFIG File Import Multiple Remote Buffer Overflow Vulnerabilities
Dia is affected by multiple remote buffer-overflow vulnerabilities. These issues are due to the application's failure to properly bounds-check user-supplied input before copying it into insufficiently sized memory buffers.
These issues allow remote attackers to execute arbitrary machine code in the context of the user running the affected application to open attacker-supplied malicious XFig files.
Dia is affected by multiple remote buffer-overflow vulnerabilities. These issues are due to the application's failure to properly bounds-check user-supplied input before copying it into insufficiently sized memory buffers.
These issues allow remote attackers to execute arbitrary machine code in the context of the user running the affected application to open attacker-supplied malicious XFig files.
Exploit / POC
DIA XFIG File Import Multiple Remote Buffer Overflow Vulnerabilities
Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected]
Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected]
Solution / Fix
DIA XFIG File Import Multiple Remote Buffer Overflow Vulnerabilities
Solution:
The vendor has released version 0.95-pre6 along with a patch for 0.94 to address these issues.
Version 0.95-pre6 is available from the Gnome CVS tree. The patch is available in the Gnome web reference (Vulnerability in xfig import code).
Please see the references for more information and vendor advisories.
DIA DIA 0.94
DIA DIA 0.93
DIA DIA 0.92.2
Solution:
The vendor has released version 0.95-pre6 along with a patch for 0.94 to address these issues.
Version 0.95-pre6 is available from the Gnome CVS tree. The patch is available in the Gnome web reference (Vulnerability in xfig import code).
Please see the references for more information and vendor advisories.
DIA DIA 0.94
-
Mandriva dia-0.94-6.2.20060mdk.i586.rpm
Mandriva Linux 2006.0:
http://wwwnew.mandriva.com/en/downloads/ -
Mandriva dia-0.94-6.2.20060mdk.x86_64.rpm
Mandriva Linux 2006.0/X86_64:
http://wwwnew.mandriva.com/en/downloads/ -
RedHat Fedora dia-0.94-13.fc4.i386.rpm
Fedora Core 4
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/4/ -
RedHat Fedora dia-0.94-13.fc4.ppc.rpm
Fedora Core 4
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/4/ -
RedHat Fedora dia-0.94-13.fc4.x86_64.rpm
Fedora Core 4
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/4/ -
RedHat Fedora dia-debuginfo-0.94-13.fc4.i386.rpm
Fedora Core 4
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/4/ -
RedHat Fedora dia-debuginfo-0.94-13.fc4.ppc.rpm
Fedora Core 4
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/4/ -
RedHat Fedora dia-debuginfo-0.94-13.fc4.x86_64.rpm
Fedora Core 4
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/4/ -
Ubuntu dia-common_0.94.0-11ubuntu1.1_all.deb
Ubuntu 5.10:
http://security.ubuntu.com/ubuntu/pool/main/d/dia/dia-common_0.94.0-11 ubuntu1.1_all.deb -
Ubuntu dia-common_0.94.0-5ubuntu1.2_all.deb
Ubuntu 5.04:
http://security.ubuntu.com/ubuntu/pool/main/d/dia/dia-common_0.94.0-5u buntu1.2_all.deb -
Ubuntu dia-gnome_0.94.0-11ubuntu1.1_amd64.deb
Ubuntu 5.10:
http://security.ubuntu.com/ubuntu/pool/main/d/dia/dia-gnome_0.94.0-11u buntu1.1_amd64.deb -
Ubuntu dia-gnome_0.94.0-11ubuntu1.1_i386.deb
Ubuntu 5.10:
http://security.ubuntu.com/ubuntu/pool/main/d/dia/dia-gnome_0.94.0-11u buntu1.1_i386.deb -
Ubuntu dia-gnome_0.94.0-11ubuntu1.1_powerpc.deb
Ubuntu 5.10:
http://security.ubuntu.com/ubuntu/pool/main/d/dia/dia-gnome_0.94.0-11u buntu1.1_powerpc.deb -
Ubuntu dia-gnome_0.94.0-5ubuntu1.2_amd64.deb
Ubuntu 5.04:
http://security.ubuntu.com/ubuntu/pool/main/d/dia/dia-gnome_0.94.0-5ub untu1.2_amd64.deb -
Ubuntu dia-gnome_0.94.0-5ubuntu1.2_i386.deb
Ubuntu 5.04:
http://security.ubuntu.com/ubuntu/pool/main/d/dia/dia-gnome_0.94.0-5ub untu1.2_i386.deb -
Ubuntu dia-gnome_0.94.0-5ubuntu1.2_powerpc.deb
Ubuntu 5.04:
http://security.ubuntu.com/ubuntu/pool/main/d/dia/dia-gnome_0.94.0-5ub untu1.2_powerpc.deb -
Ubuntu dia-libs_0.94.0-11ubuntu1.1_amd64.deb
Ubuntu 5.10:
http://security.ubuntu.com/ubuntu/pool/main/d/dia/dia-libs_0.94.0-11ub untu1.1_amd64.deb -
Ubuntu dia-libs_0.94.0-11ubuntu1.1_i386.deb
Ubuntu 5.10:
http://security.ubuntu.com/ubuntu/pool/main/d/dia/dia-libs_0.94.0-11ub untu1.1_i386.deb -
Ubuntu dia-libs_0.94.0-11ubuntu1.1_powerpc.deb
Ubuntu 5.10:
http://security.ubuntu.com/ubuntu/pool/main/d/dia/dia-libs_0.94.0-11ub untu1.1_powerpc.deb -
Ubuntu dia-libs_0.94.0-5ubuntu1.2_amd64.deb
Ubuntu 5.04:
http://security.ubuntu.com/ubuntu/pool/main/d/dia/dia-libs_0.94.0-5ubu ntu1.2_amd64.deb -
Ubuntu dia-libs_0.94.0-5ubuntu1.2_i386.deb
Ubuntu 5.04:
http://security.ubuntu.com/ubuntu/pool/main/d/dia/dia-libs_0.94.0-5ubu ntu1.2_i386.deb -
Ubuntu dia-libs_0.94.0-5ubuntu1.2_powerpc.deb
Ubuntu 5.04:
http://security.ubuntu.com/ubuntu/pool/main/d/dia/dia-libs_0.94.0-5ubu ntu1.2_powerpc.deb -
Ubuntu dia_0.94.0-11ubuntu1.1_amd64.deb
Ubuntu 5.10:
http://security.ubuntu.com/ubuntu/pool/universe/d/dia/dia_0.94.0-11ubu ntu1.1_amd64.deb -
Ubuntu dia_0.94.0-11ubuntu1.1_i386.deb
Ubuntu 5.10:
http://security.ubuntu.com/ubuntu/pool/universe/d/dia/dia_0.94.0-11ubu ntu1.1_i386.deb -
Ubuntu dia_0.94.0-11ubuntu1.1_powerpc.deb
Ubuntu 5.10:
http://security.ubuntu.com/ubuntu/pool/universe/d/dia/dia_0.94.0-11ubu ntu1.1_powerpc.deb -
Ubuntu dia_0.94.0-5ubuntu1.2_amd64.deb
Ubuntu 5.04:
http://security.ubuntu.com/ubuntu/pool/universe/d/dia/dia_0.94.0-5ubun tu1.2_amd64.deb -
Ubuntu dia_0.94.0-5ubuntu1.2_i386.deb
Ubuntu 5.04:
http://security.ubuntu.com/ubuntu/pool/universe/d/dia/dia_0.94.0-5ubun tu1.2_i386.deb -
Ubuntu dia_0.94.0-5ubuntu1.2_powerpc.deb
Ubuntu 5.04:
http://security.ubuntu.com/ubuntu/pool/universe/d/dia/dia_0.94.0-5ubun tu1.2_powerpc.deb
DIA DIA 0.93
-
Ubuntu dia-common_0.93-4ubuntu2.1_all.deb
Ubuntu 4.10:
http://security.ubuntu.com/ubuntu/pool/main/d/dia/dia-common_0.93-4ubu ntu2.1_all.deb -
Ubuntu dia-gnome_0.93-4ubuntu2.1_amd64.deb
Ubuntu 4.10:
http://security.ubuntu.com/ubuntu/pool/main/d/dia/dia-gnome_0.93-4ubun tu2.1_amd64.deb -
Ubuntu dia-gnome_0.93-4ubuntu2.1_i386.deb
Ubuntu 4.10:
http://security.ubuntu.com/ubuntu/pool/main/d/dia/dia-gnome_0.93-4ubun tu2.1_i386.deb -
Ubuntu dia-gnome_0.93-4ubuntu2.1_powerpc.deb
Ubuntu 4.10:
http://security.ubuntu.com/ubuntu/pool/main/d/dia/dia-gnome_0.93-4ubun tu2.1_powerpc.deb -
Ubuntu dia-libs_0.93-4ubuntu2.1_amd64.deb
Ubuntu 4.10:
http://security.ubuntu.com/ubuntu/pool/main/d/dia/dia-libs_0.93-4ubunt u2.1_amd64.deb -
Ubuntu dia-libs_0.93-4ubuntu2.1_i386.deb
Ubuntu 4.10:
http://security.ubuntu.com/ubuntu/pool/main/d/dia/dia-libs_0.93-4ubunt u2.1_i386.deb -
Ubuntu dia-libs_0.93-4ubuntu2.1_powerpc.deb
Ubuntu 4.10:
http://security.ubuntu.com/ubuntu/pool/main/d/dia/dia-libs_0.93-4ubunt u2.1_powerpc.deb -
Ubuntu dia_0.93-4ubuntu2.1_amd64.deb
Ubuntu 4.10:
http://security.ubuntu.com/ubuntu/pool/universe/d/dia/dia_0.93-4ubuntu 2.1_amd64.deb -
Ubuntu dia_0.93-4ubuntu2.1_i386.deb
Ubuntu 4.10:
http://security.ubuntu.com/ubuntu/pool/universe/d/dia/dia_0.93-4ubuntu 2.1_i386.deb -
Ubuntu dia_0.93-4ubuntu2.1_powerpc.deb
Ubuntu 4.10:
http://security.ubuntu.com/ubuntu/pool/universe/d/dia/dia_0.93-4ubuntu 2.1_powerpc.deb
DIA DIA 0.92.2
-
Mandriva dia-0.92.2-2.1.C30mdk.i586.rpm
Corporate 3.0:
http://wwwnew.mandriva.com/en/downloads/ -
Mandriva dia-0.92.2-2.1.C30mdk.x86_64.rpm
Corporate 3.0/X86_64:
http://wwwnew.mandriva.com/en/downloads/
References
DIA XFIG File Import Multiple Remote Buffer Overflow Vulnerabilities
References:
References: