Vulnerability Details : CVE-2009-4228
Stack consumption vulnerability in u_bound.c in Xfig 3.2.5b and earlier allows remote attackers to cause a denial of service (application crash) via a long string in a malformed .fig file that uses the 1.3 file format, possibly related to the readfp_fig function in f_read.c.
Vulnerability category: Denial of service
Products affected by CVE-2009-4228
- cpe:2.3:a:xfig:xfig:*:*:*:*:*:*:*:*
- cpe:2.3:a:xfig:xfig:3.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:xfig:xfig:3.2.4:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2009-4228
0.46%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 72 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2009-4228
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:N/A:P |
8.6
|
2.9
|
NIST |
CWE ids for CVE-2009-4228
-
Assigned by: nvd@nist.gov (Primary)
Vendor statements for CVE-2009-4228
-
Red Hat 2009-12-15Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2009-4228 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/
References for CVE-2009-4228
-
https://bugzilla.redhat.com/show_bug.cgi?id=543905
543905 – (CVE-2009-4227, CVE-2009-4228) CVE-2009-4227 CVE-2009-4228 Xfig, Transfig: Stack-based buffer overflow by loading malformed .FIG files
-
http://www.mandriva.com/security/advisories?name=MDVSA-2011:010
mandriva.com
-
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559274
#559274 - xfig: buffer overflow in read .fig file - Debian Bug report logs
-
http://www.vupen.com/english/advisories/2011/0108
Webmail | OVH- OVH
Jump to