FreeBSD : dia -- XFig Import Plugin Buffer Overflow (b5fc63ad-c4c3-11da-9699-00123ffe8333)

This script is Copyright (C) 2006-2014 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

Secunia reports :

Some vulnerabilities have been reported in Dia, which potentially can
be exploited by malicious people to compromise a user's system.

The vulnerabilities are caused due to boundary errors within the XFig
import plugin. This can be exploited to cause buffer overflows and may
allow arbitrary code execution when a specially crafted FIG file is
imported.

See also :

http://mail.gnome.org/archives/dia-list/2006-March/msg00149.html
http://www.nessus.org/u?8ce20906

Solution :

Update the affected packages.

Risk factor :

High / CVSS Base Score : 7.6
(CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 21498 (freebsd_pkg_b5fc63adc4c311da969900123ffe8333.nasl)

Bugtraq ID:

CVE ID: CVE-2006-1550

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now