6.8
CVSSv2

CVE-2009-4227

Published: 08/12/2009 Updated: 17/08/2017
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 685
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Stack-based buffer overflow in the read_1_3_textobject function in f_readold.c in Xfig 3.2.5b and previous versions, and in the read_textobject function in read1_3.c in fig2dev in Transfig 3.2.5a and previous versions, allows remote malicious users to execute arbitrary code via a long string in a malformed .fig file that uses the 1.3 file format. NOTE: some of these details are obtained from third party information.

Vulnerable Product Search on Vulmon Subscribe to Product

xfig xfig 3.2.5

xfig xfig

Exploits

source: wwwsecurityfocuscom/bid/37193/info Xfig and Transfig are prone to a buffer-overflow vulnerability because they fail to perform adequate boundary checks on user-supplied input Attackers may leverage this issue to execute arbitrary code in the context of the application Failed attacks will cause denial-of-service conditions Xfi ...