Описание
Stack-based buffer overflow in Xfig 3.2.4 and 3.2.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a FIG image with a crafted color definition.
| Релиз | Статус | Примечание |
|---|---|---|
| artful | ignored | end of life |
| bionic | not-affected | 1:3.2.5.c-1ubuntu1 |
| cosmic | not-affected | 1:3.2.5.c-1ubuntu1 |
| dapper | ignored | end of life |
| devel | not-affected | 1:3.2.5.c-1ubuntu1 |
| esm-apps/bionic | not-affected | 1:3.2.5.c-1ubuntu1 |
| esm-apps/xenial | not-affected | 1:3.2.5.c-1ubuntu1 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was not-affected [1:3.2.5.c-1ubuntu1]] |
| hardy | ignored | end of life |
| karmic | ignored | end of life |
Показывать по
Ссылки на источники
EPSS
6.8 Medium
CVSS2
Связанные уязвимости
Stack-based buffer overflow in Xfig 3.2.4 and 3.2.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a FIG image with a crafted color definition.
Stack-based buffer overflow in Xfig 3.2.4 and 3.2.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a FIG image with a crafted color definition.
Stack-based buffer overflow in Xfig 3.2.4 and 3.2.5 allows remote atta ...
Stack-based buffer overflow in Xfig 3.2.4 and 3.2.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a FIG image with a crafted color definition.
EPSS
6.8 Medium
CVSS2