Stack-based buffer overflow in Xfig 3.2.4 and 3.2.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a FIG image with a crafted color definition.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:20
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052247.html - Exploit, Patch | |
References | () http://secunia.com/advisories/42579 - Vendor Advisory | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2011:010 - | |
References | () http://www.openwall.com/lists/oss-security/2010/12/03/2 - Exploit | |
References | () http://www.openwall.com/lists/oss-security/2010/12/06/8 - Exploit | |
References | () http://www.securityfocus.com/bid/45177 - Exploit | |
References | () http://www.vupen.com/english/advisories/2010/3232 - Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2011/0108 - | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=657981 - Exploit | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=659676 - Exploit, Patch |
Information
Published : 2010-12-17 19:00
Updated : 2024-11-21 01:20
NVD link : CVE-2010-4262
Mitre link : CVE-2010-4262
CVE.ORG link : CVE-2010-4262
JSON object : View
Products Affected
xfig
- xfig
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer