blob: b6632aa6528802a88d9ece6eddcfa0620ba544f1 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200510-06">
<title>Dia: Arbitrary code execution through SVG import</title>
Improperly sanitised data in Dia allows remote attackers to execute
arbitrary code.
<product type="ebuild">dia</product>
<announced>October 06, 2005</announced>
<revised>October 06, 2005: 01</revised>
<package name="app-office/dia" auto="yes" arch="*">
<unaffected range="ge">0.94-r3</unaffected>
<vulnerable range="lt">0.94-r3</vulnerable>
Dia is a gtk+ based diagram creation program released under the
GPL license.
Joxean Koret discovered that the SVG import plugin in Dia fails to
properly sanitise data read from an SVG file.
<impact type="normal">
An attacker could create a specially crafted SVG file, which, when
imported into Dia, could lead to the execution of arbitrary code.
There is no known workaround at this time.
All Dia users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=app-office/dia-0.94-r3&quot;</code>
<uri link="">CAN-2005-2966</uri>
<metadata tag="requester" timestamp="Tue, 04 Oct 2005 12:58:56 +0000">
<metadata tag="submitter" timestamp="Tue, 04 Oct 2005 18:51:11 +0000">
<metadata tag="bugReady" timestamp="Wed, 05 Oct 2005 07:39:21 +0000">