Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2009-4227

Опубликовано: 08 дек. 2009
Источник: ubuntu
Приоритет: medium
CVSS2: 6.8

Описание

Stack-based buffer overflow in the read_1_3_textobject function in f_readold.c in Xfig 3.2.5b and earlier, and in the read_textobject function in read1_3.c in fig2dev in Transfig 3.2.5a and earlier, allows remote attackers to execute arbitrary code via a long string in a malformed .fig file that uses the 1.3 file format. NOTE: some of these details are obtained from third party information.

РелизСтатусПримечание
artful

ignored

end of life
bionic

not-affected

1:3.2.5.c-7
cosmic

ignored

end of life
dapper

ignored

end of life
devel

not-affected

1:3.2.5.c-7
disco

ignored

end of life
eoan

ignored

end of life
esm-apps/bionic

not-affected

1:3.2.5.c-7
esm-apps/focal

not-affected

1:3.2.5.c-7
esm-apps/xenial

not-affected

1:3.2.5.c-7

Показывать по

Ссылки на источники

6.8 Medium

CVSS2

Связанные уязвимости

redhat
около 16 лет назад

Stack-based buffer overflow in the read_1_3_textobject function in f_readold.c in Xfig 3.2.5b and earlier, and in the read_textobject function in read1_3.c in fig2dev in Transfig 3.2.5a and earlier, allows remote attackers to execute arbitrary code via a long string in a malformed .fig file that uses the 1.3 file format. NOTE: some of these details are obtained from third party information.

nvd
около 16 лет назад

Stack-based buffer overflow in the read_1_3_textobject function in f_readold.c in Xfig 3.2.5b and earlier, and in the read_textobject function in read1_3.c in fig2dev in Transfig 3.2.5a and earlier, allows remote attackers to execute arbitrary code via a long string in a malformed .fig file that uses the 1.3 file format. NOTE: some of these details are obtained from third party information.

debian
около 16 лет назад

Stack-based buffer overflow in the read_1_3_textobject function in f_r ...

github
больше 3 лет назад

Stack-based buffer overflow in the read_1_3_textobject function in f_readold.c in Xfig 3.2.5b and earlier, and in the read_textobject function in read1_3.c in fig2dev in Transfig 3.2.5a and earlier, allows remote attackers to execute arbitrary code via a long string in a malformed .fig file that uses the 1.3 file format. NOTE: some of these details are obtained from third party information.

6.8 Medium

CVSS2