Revision Date: | 2013-04-29 | Version: | 10 | Title: | Format string vulnerability in Dia 0.94 allows user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code by triggering errors or warnings, as demonstrated via format string specifiers in a .bmp filename. NOTE: the original exploit was demonstrated through a command line argument, but there are other mechanisms for input that are automatically processed by Dia, such as a crafted .dia file. | Description: | Format string vulnerability in Dia 0.94 allows user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code by triggering errors or warnings, as demonstrated via format string specifiers in a .bmp filename. NOTE: the original exploit was demonstrated through a command line argument, but there are other mechanisms for input that are automatically processed by Dia, such as a crafted .dia file. | Family: | unix | Class: | vulnerability | Status: | ACCEPTED | Reference(s): | CVE-2006-2480
| Platform(s): | CentOS Linux 4 Oracle Linux 4 Red Hat Enterprise Linux 4
| Product(s): | | Definition Synopsis | RHEL4, CentOS4 or Oracle Linux 4 The operating system installed on the system is Red Hat Enterprise Linux 4
OR CentOS Linux 4.x
OR Oracle Linux 4.x
AND dia is earlier than 1:0.94-5.7.1
|
|