|Category:||Ubuntu Local Security Checks|
|Title:||Ubuntu USN-266-1 (dia)|
|Summary:||Ubuntu USN-266-1 (dia)|
The remote host is missing an update to dia
announced via advisory USN-266-1.
A security issue affects the following Ubuntu releases:
Ubuntu 4.10 (Warty Warthog)
Ubuntu 5.04 (Hoary Hedgehog)
Ubuntu 5.10 (Breezy Badger)
The following packages are affected: dia dia-gnome dia-libs
Three buffer overflows were discovered in the Xfig file format
importer. By tricking a user into opening a specially crafted .fig
file with dia, an attacker could exploit this to execute arbitrary
code with the user's privileges.
The problem can be corrected by upgrading the affected package to
version 0.93-4ubuntu2.1 (for Ubuntu 4.10), 0.94.0-5ubuntu1.2 (for
Ubuntu 5.04), or 0.94.0-11ubuntu1.1 (for Ubuntu 5.10). In general, a
standard system upgrade is sufficient to effect the necessary changes.
Risk factor : High
BugTraq ID: 17310|
Common Vulnerability Exposure (CVE) ID: CVE-2006-1550
Bugtraq: 20060329 Buffer overflows in Dia XFig import (Google Search)
Debian Security Information: DSA-1025 (Google Search)
SuSE Security Announcement: SUSE-SR:2006:009 (Google Search)
XForce ISS Database: diaxfig-xfig-import-bo(25566)
|Copyright||Copyright (c) 2006 E-Soft Inc. http://www.securityspace.com|
|This is only one of 43391 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.