Vulnerability Name: | CVE-2006-2480 (CCN-26601) | ||||||||||||||||||||||||
Assigned: | 2004-05-10 | ||||||||||||||||||||||||
Published: | 2004-05-10 | ||||||||||||||||||||||||
Updated: | 2018-10-03 | ||||||||||||||||||||||||
Summary: | Format string vulnerability in Dia 0.94 allows user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code by triggering errors or warnings, as demonstrated via format string specifiers in a .bmp filename. Note: the original exploit was demonstrated through a command line argument, but there are other mechanisms for input that are automatically processed by Dia, such as a crafted .dia file. | ||||||||||||||||||||||||
CVSS v3 Severity: | 5.6 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||||||||||||||||||
CVSS v2 Severity: | 5.1 Medium (CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||||||
Vulnerability Type: | CWE-134 | ||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||
References: | Source: CCN Type: Vuln-Dev Mailing List, Fri May 05 2006 - 23:51:14 CDT DIA file name handling format string Source: CCN Type: GNOME Bugzilla Bug 242111 message format string vulnerability Source: CONFIRM Type: Exploit http://bugzilla.gnome.org/show_bug.cgi?id=342111 Source: MITRE Type: CNA CVE-2006-2480 Source: MISC Type: Exploit http://kandangjamur.net/tutorial/dia.txt Source: CCN Type: RHSA-2006-0541 dia security update Source: CCN Type: SA20199 Dia Multiple Format String Vulnerabilities Source: SECUNIA Type: Vendor Advisory 20199 Source: SECUNIA Type: Patch, Vendor Advisory 20254 Source: SECUNIA Type: Vendor Advisory 20339 Source: SECUNIA Type: Vendor Advisory 20422 Source: SECUNIA Type: Vendor Advisory 20457 Source: SECUNIA Type: Vendor Advisory 20513 Source: CCN Type: SECTRACK ID: 1016203 Dia Format String Bugs May Let Users Execute Arbitrary Code Source: SECTRACK Type: UNKNOWN 1016203 Source: CCN Type: ASA-2006-112 dia security update (RHSA-2006-0541) Source: CCN Type: GLSA-200606-03 Dia: Format string vulnerabilities Source: GENTOO Type: UNKNOWN GLSA-200606-03 Source: CCN Type: GNOME Web site Dia a drawing program Source: MANDRIVA Type: UNKNOWN MDKSA-2006:093 Source: SUSE Type: Vendor Advisory SUSE-SR:2006:012 Source: OSVDB Type: UNKNOWN 25699 Source: CCN Type: OSVDB ID: 25699 Dia File Name Handling Local Format String Source: REDHAT Type: Vendor Advisory RHSA-2006:0541 Source: VULN-DEV Type: Exploit 20060506 DIA file name handling format string Source: BID Type: UNKNOWN 18078 Source: CCN Type: BID-18078 Dia Filename Remote Format String Vulnerability Source: CCN Type: USN-286-1 Dia vulnerabilities Source: VUPEN Type: Vendor Advisory ADV-2006-1908 Source: XF Type: UNKNOWN dia-filename-format-string(26601) Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:11224 Source: UBUNTU Type: UNKNOWN USN-286-1 Source: SUSE Type: SUSE-SR:2006:012 SUSE Security Summary Report | ||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration RedHat 4: Configuration RedHat 5: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||
| |||||||||||||||||||||||||
BACK |