Synopsis
The remote TencentOS Server 4 host is missing one or more security updates.
Description
The version of Tencent Linux installed on the remote TencentOS Server 4 host is prior to tested version. It is, therefore, affected by multiple vulnerabilities as referenced in the TSSA-2025:0488 advisory.
Package updates are available for TencentOS Server 4 that fix the following vulnerabilities:
CVE-2025-46400:
In xfig diagramming tool, a segmentation fault while running fig2dev allows an attacker to availability via local input manipulation via read_arcobject function.
CVE-2025-46399:
A flaw was found in fig2dev. This vulnerability allows availability via local input manipulation via genge_itp_spline function.
CVE-2025-46398:
In xfig diagramming tool, a stack-overflow while running fig2dev allows memory corruption via local input manipulation via read_objects function.
CVE-2025-46397:
In xfig diagramming tool, a stack-overflowwhile running fig2dev allows memory corruption via local input manipulation at the bezier_spline function.
CVE-2025-31163:
Segmentation fault in fig2dev in version 3.2.9aallows an attacker to availability via local input manipulation viaput_patternarc function.
CVE-2025-31162:
Floating point exception in fig2dev in version 3.2.9aallows an attacker to availability via local input manipulation viaget_slope function.
Tenable has extracted the preceding description block directly from the Tencent Linux security advisory.
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
Solution
Update the affected packages.
Plugin Details
File Name: tencentos_TSSA_2025_0488.nasl
Supported Sensors: Nessus
Vulnerability Information
CPE: p-cpe:/a:tencent:tencentos_server:transfig, cpe:/o:tencent:tencentos_server:4
Required KB Items: Host/local_checks_enabled, Host/etc/os-release, Host/TencentOS/rpm-list, Host/cpu
Exploit Ease: No known exploits are available
Patch Publication Date: 6/27/2025
Vulnerability Publication Date: 6/27/2025