Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Summary
Title Dia vulnerabilities
Informations
Name USN-286-1 First vendor Publication 2006-05-24
Vendor Ubuntu Last vendor Modification 2006-05-24
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score 7.5 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

A security issue affects the following Ubuntu releases:

Ubuntu 5.04 (Hoary Hedgehog) Ubuntu 5.10 (Breezy Badger)

The following packages are affected:

dia dia-gnome

The problem can be corrected by upgrading the affected package to version 0.94.0-5ubuntu1.3 (for Ubuntu 5.04), or 0.94.0-11ubuntu1.2 (for Ubuntu 5.10). After doing a standard system upgrade you need to restart dia to effect the necessary changes.

Details follow:

Several format string vulnerabilities have been discovered in dia. By tricking a user into opening a specially crafted dia file, or a file with a specially crafted name, this could be exploited to execute arbitrary code with the user's privileges.

Original Source

Url : http://www.ubuntu.com/usn/USN-286-1

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-134 Uncontrolled Format String (CWE/SANS Top 25)

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:11224
 
Oval ID: oval:org.mitre.oval:def:11224
Title: Format string vulnerability in Dia 0.94 allows user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code by triggering errors or warnings, as demonstrated via format string specifiers in a .bmp filename. NOTE: the original exploit was demonstrated through a command line argument, but there are other mechanisms for input that are automatically processed by Dia, such as a crafted .dia file.
Description: Format string vulnerability in Dia 0.94 allows user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code by triggering errors or warnings, as demonstrated via format string specifiers in a .bmp filename. NOTE: the original exploit was demonstrated through a command line argument, but there are other mechanisms for input that are automatically processed by Dia, such as a crafted .dia file.
Family: unix Class: vulnerability
Reference(s): CVE-2006-2480
Version: 5
Platform(s): Red Hat Enterprise Linux 4
CentOS Linux 4
Oracle Linux 4
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:11600
 
Oval ID: oval:org.mitre.oval:def:11600
Title: Multiple unspecified format string vulnerabilities in Dia have unspecified impact and attack vectors, a different set of issues than CVE-2006-2480.
Description: Multiple unspecified format string vulnerabilities in Dia have unspecified impact and attack vectors, a different set of issues than CVE-2006-2480.
Family: unix Class: vulnerability
Reference(s): CVE-2006-2453
Version: 5
Platform(s): Red Hat Enterprise Linux 4
CentOS Linux 4
Oracle Linux 4
Product(s):
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 2

OpenVAS Exploits

Date Description
2008-09-24 Name : Gentoo Security Advisory GLSA 200606-03 (dia)
File : nvt/glsa_200606_03.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
25840 Dia Unspecified Format String

25699 Dia File Name Handling Local Format String

Dia contains a flaw that may allow a malicious user to execute arbitrary code. The issue is triggered when the program is used to open a file using the 'Open Diagram' dialog box and if the file name contains format string characters. It is possible that the flaw may allow arbitrary code execution resulting in a loss of integrity.

Nessus® Vulnerability Scanner

Date Description
2012-09-24 Name : The remote Fedora Core host is missing a security update.
File : fedora_extras_dia_2006-001.nasl - Type : ACT_GATHER_INFO
2007-10-17 Name : The remote openSUSE host is missing a security update.
File : suse_dia-1435.nasl - Type : ACT_GATHER_INFO
2007-01-17 Name : The remote Fedora Core host is missing a security update.
File : fedora_2006-580.nasl - Type : ACT_GATHER_INFO
2006-07-05 Name : The remote CentOS host is missing a security update.
File : centos_RHSA-2006-0541.nasl - Type : ACT_GATHER_INFO
2006-06-08 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-200606-03.nasl - Type : ACT_GATHER_INFO
2006-06-05 Name : The remote Red Hat host is missing a security update.
File : redhat-RHSA-2006-0541.nasl - Type : ACT_GATHER_INFO
2006-05-31 Name : The remote Mandrake Linux host is missing a security update.
File : mandrake_MDKSA-2006-093.nasl - Type : ACT_GATHER_INFO
2006-05-27 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-286-1.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2014-02-17 12:03:27
  • Multiple Updates