Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Mon, 6 Dec 2010 16:15:52 -0500 (EST)
From: Josh Bressers <>
Cc: Ulrik Persson <>, Hans de Goede <>,
        Stanislav Ochotnicky <>,
        "Steven M. Christey" <>
Subject: Re: CVE Request -- Xfig: Stack-based buffer overflow
 by processing FIG image with crafted color definition

Please use CVE-2010-4262



----- "Jan Lieskovsky" <> wrote:

> Hello Josh, Steve, vendors,
>    the Team of Underground Stockholm researchers reported:
>    [1]
>    i.e:
>    A stack-based buffer overflow flaw was found in
>    the way Xfig processed certain FIG images. A remote
>    attacker could create a FIG image with specially-crafted
>    color definition, and trick the local, unsuspecting
>    user into opening it, which could lead to xfig executable
>    crash or, potentially, arbitrary code execution with
>    the privileges of the user running the executable.
>    Public PoC:
>    [2]
>    Flaw severity note:
>    On systems with compile time buffer checks (FORTIFY_SOURCE)
>    feature enabled, the impact of this flaw is mitigated to
>    be only crash.
> Could you allocate CVE id for this?
> Thanks && Regards, Jan.
> --
> Jan iankko Lieskovsky / Red Hat Security Response Team

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ