CVE-2006-2480

Format string vulnerability in Dia 0.94 allows user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code by triggering errors or warnings, as demonstrated via format string specifiers in a .bmp filename. NOTE: the original exploit was demonstrated through a command line argument, but there are other mechanisms for input that are automatically processed by Dia, such as a crafted .dia file.
References
Link Resource
http://bugzilla.gnome.org/show_bug.cgi?id=342111 Exploit
http://kandangjamur.net/tutorial/dia.txt Exploit
http://secunia.com/advisories/20199 Vendor Advisory
http://secunia.com/advisories/20254 Patch Vendor Advisory
http://secunia.com/advisories/20339 Vendor Advisory
http://secunia.com/advisories/20422 Vendor Advisory
http://secunia.com/advisories/20457 Vendor Advisory
http://secunia.com/advisories/20513 Vendor Advisory
http://securitytracker.com/id?1016203
http://www.gentoo.org/security/en/glsa/glsa-200606-03.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2006:093
http://www.novell.com/linux/security/advisories/2006-06-02.html Vendor Advisory
http://www.osvdb.org/25699
http://www.redhat.com/support/errata/RHSA-2006-0541.html Vendor Advisory
http://www.securityfocus.com/archive/82/433313/30/0/threaded Exploit
http://www.securityfocus.com/bid/18078
http://www.vupen.com/english/advisories/2006/1908 Vendor Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11224
https://usn.ubuntu.com/286-1/
http://bugzilla.gnome.org/show_bug.cgi?id=342111 Exploit
http://kandangjamur.net/tutorial/dia.txt Exploit
http://secunia.com/advisories/20199 Vendor Advisory
http://secunia.com/advisories/20254 Patch Vendor Advisory
http://secunia.com/advisories/20339 Vendor Advisory
http://secunia.com/advisories/20422 Vendor Advisory
http://secunia.com/advisories/20457 Vendor Advisory
http://secunia.com/advisories/20513 Vendor Advisory
http://securitytracker.com/id?1016203
http://www.gentoo.org/security/en/glsa/glsa-200606-03.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2006:093
http://www.novell.com/linux/security/advisories/2006-06-02.html Vendor Advisory
http://www.osvdb.org/25699
http://www.redhat.com/support/errata/RHSA-2006-0541.html Vendor Advisory
http://www.securityfocus.com/archive/82/433313/30/0/threaded Exploit
http://www.securityfocus.com/bid/18078
http://www.vupen.com/english/advisories/2006/1908 Vendor Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11224
https://usn.ubuntu.com/286-1/
Configurations

Configuration 1 (hide)

cpe:2.3:a:dia:dia:0.94:*:*:*:*:*:*:*

History

21 Nov 2024, 00:11

Type Values Removed Values Added
References () http://bugzilla.gnome.org/show_bug.cgi?id=342111 - Exploit () http://bugzilla.gnome.org/show_bug.cgi?id=342111 - Exploit
References () http://kandangjamur.net/tutorial/dia.txt - Exploit () http://kandangjamur.net/tutorial/dia.txt - Exploit
References () http://secunia.com/advisories/20199 - Vendor Advisory () http://secunia.com/advisories/20199 - Vendor Advisory
References () http://secunia.com/advisories/20254 - Patch, Vendor Advisory () http://secunia.com/advisories/20254 - Patch, Vendor Advisory
References () http://secunia.com/advisories/20339 - Vendor Advisory () http://secunia.com/advisories/20339 - Vendor Advisory
References () http://secunia.com/advisories/20422 - Vendor Advisory () http://secunia.com/advisories/20422 - Vendor Advisory
References () http://secunia.com/advisories/20457 - Vendor Advisory () http://secunia.com/advisories/20457 - Vendor Advisory
References () http://secunia.com/advisories/20513 - Vendor Advisory () http://secunia.com/advisories/20513 - Vendor Advisory
References () http://securitytracker.com/id?1016203 - () http://securitytracker.com/id?1016203 -
References () http://www.gentoo.org/security/en/glsa/glsa-200606-03.xml - () http://www.gentoo.org/security/en/glsa/glsa-200606-03.xml -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2006:093 - () http://www.mandriva.com/security/advisories?name=MDKSA-2006:093 -
References () http://www.novell.com/linux/security/advisories/2006-06-02.html - Vendor Advisory () http://www.novell.com/linux/security/advisories/2006-06-02.html - Vendor Advisory
References () http://www.osvdb.org/25699 - () http://www.osvdb.org/25699 -
References () http://www.redhat.com/support/errata/RHSA-2006-0541.html - Vendor Advisory () http://www.redhat.com/support/errata/RHSA-2006-0541.html - Vendor Advisory
References () http://www.securityfocus.com/archive/82/433313/30/0/threaded - Exploit () http://www.securityfocus.com/archive/82/433313/30/0/threaded - Exploit
References () http://www.securityfocus.com/bid/18078 - () http://www.securityfocus.com/bid/18078 -
References () http://www.vupen.com/english/advisories/2006/1908 - Vendor Advisory () http://www.vupen.com/english/advisories/2006/1908 - Vendor Advisory
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11224 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11224 -
References () https://usn.ubuntu.com/286-1/ - () https://usn.ubuntu.com/286-1/ -

Information

Published : 2006-05-19 21:02

Updated : 2024-11-21 00:11


NVD link : CVE-2006-2480

Mitre link : CVE-2006-2480

CVE.ORG link : CVE-2006-2480


JSON object : View

Products Affected

dia

  • dia
CWE
CWE-134

Use of Externally-Controlled Format String