How to Buy
This script is Copyright (C) 2006-2016 Tenable Network Security, Inc.
The remote Red Hat host is missing a security update.
Updated Dia packages that fix several buffer overflow bugs are now
This update has been rated as having moderate security impact by the
Red Hat Security Response Team.
The Dia drawing program is designed to draw various types of diagrams.
Several format string flaws were found in the way dia displays certain
messages. If an attacker is able to trick a Dia user into opening a
carefully crafted file, it may be possible to execute arbitrary code
as the user running Dia. (CVE-2006-2453, CVE-2006-2480)
Users of Dia should update to these erratum packages, which contain
backported patches and are not vulnerable to these issues.
See also :
Update the affected dia package.
Risk factor :
High / CVSS Base Score : 7.5
CVSS Temporal Score : 6.4
Public Exploit Available : true
Family: Red Hat Local Security Checks
Nessus Plugin ID: 21638 ()
Bugtraq ID: 1807818166
CVE ID: CVE-2006-2453CVE-2006-2480
Get Nessus Professional to scan unlimited IPs, run compliance checks & more
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.