ID CVE-2009-4228
Summary Stack consumption vulnerability in u_bound.c in Xfig 3.2.5b and earlier allows remote attackers to cause a denial of service (application crash) via a long string in a malformed .fig file that uses the 1.3 file format, possibly related to the readfp_fig function in f_read.c.
References
Vulnerable Configurations
  • cpe:2.3:a:xfig:xfig:3.2.4:*:*:*:*:*:*:*
    cpe:2.3:a:xfig:xfig:3.2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:xfig:xfig:3.2.5:*:*:*:*:*:*:*
    cpe:2.3:a:xfig:xfig:3.2.5:*:*:*:*:*:*:*
  • cpe:2.3:a:xfig:xfig:*:*:*:*:*:*:*:*
    cpe:2.3:a:xfig:xfig:*:*:*:*:*:*:*:*
CVSS
Base: 4.3 (as of 20-01-2011 - 06:37)
Impact:
Exploitability:
CWE CWE-399
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:M/Au:N/C:N/I:N/A:P
refmap via4
confirm
mandriva MDVSA-2011:010
vupen ADV-2011-0108
statements via4
contributor Joshua Bressers
lastmodified 2009-12-15
organization Red Hat
statement Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2009-4228 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/
Last major update 20-01-2011 - 06:37
Published 08-12-2009 - 18:30
Last modified 20-01-2011 - 06:37
Back to Top