blob: 60a2f696263b32fb4c57e903a438c66c4d00aeeb [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200604-14">
<title>Dia: Arbitrary code execution through XFig import</title>
Buffer overflows in Dia's XFig import could allow remote attackers to
execute arbitrary code.
<product type="ebuild">dia</product>
<announced>April 23, 2006</announced>
<revised>April 23, 2006: 01</revised>
<package name="app-office/dia" auto="yes" arch="*">
<unaffected range="ge">0.94-r5</unaffected>
<vulnerable range="lt">0.94-r5</vulnerable>
Dia is a GTK+ based diagram creation program.
infamous41md discovered multiple buffer overflows in Dia's XFig
file import plugin.
<impact type="normal">
By enticing a user to import a specially crafted XFig file into
Dia, an attacker could exploit this issue to execute arbitrary code
with the rights of the user running Dia.
There is no known workaround at this time.
All Dia users should upgrade to the latest available version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=app-office/dia-0.94-r5&quot;</code>
<uri link="">CVE-2006-1550</uri>
<metadata tag="requester" timestamp="Sat, 22 Apr 2006 17:58:09 +0000">
<metadata tag="bugReady" timestamp="Sat, 22 Apr 2006 17:58:17 +0000">
<metadata tag="submitter" timestamp="Sat, 22 Apr 2006 20:01:59 +0000">