Security
Headlines
HeadlinesLatestCVEs

Headline

Ubuntu Security Notice USN-5864-1

Ubuntu Security Notice 5864-1 - Frederic Cambus discovered that Fig2dev incorrectly handled certain image files. If a user or an automated system were tricked into opening a certain specially crafted input file, a remote attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 18.04 LTS. It was discovered that Fig2dev incorrectly handled certain image files. If a user or an automated system were tricked into opening a certain specially crafted input file, a remote attacker could possibly use this issue to cause a denial of service.

Packet Storm
#vulnerability#ubuntu#dos
==========================================================================Ubuntu Security Notice USN-5864-1February 13, 2023fig2dev vulnerabilities==========================================================================A security issue affects these releases of Ubuntu and its derivatives:- Ubuntu 20.04 LTS- Ubuntu 18.04 LTSSummary:Several security issues were fixed in Fig2dev.Software Description:- fig2dev: Utilities for converting XFig figure filesDetails:Frederic Cambus discovered that Fig2dev incorrectly handled certain imagefiles. If a user or an automated system were tricked into opening a certainspecially crafted input file, a remote attacker could possibly use this issueto cause a denial of service. This issue only affected Ubuntu 18.04 LTS.(CVE-2019-14275)It was discovered that Fig2dev incorrectly handled certain image files. Ifa user or an automated system were tricked into opening a certain speciallycrafted input file, a remote attacker could possibly use this issue to causea denial of service. (CVE-2019-19555, CVE-2019-19797, CVE-2020-21529,CVE-2020-21530, CVE-2020-21531, CVE-2020-21532, CVE-2020-21533,CVE-2020-21534, CVE-2020-21535, CVE-2020-21675, CVE-2020-21676,CVE-2021-3561)It was discovered that Fig2dev incorrectly handled certain image files. Ifa user or an automated system were tricked into opening a certain speciallycrafted input file, a remote attacker could possibly use this issue to causea denial of service. (CVE-2021-32280)Update instructions:The problem can be corrected by updating your system to the followingpackage versions:Ubuntu 20.04 LTS:   fig2dev                         1:3.2.7a-7ubuntu0.1Ubuntu 18.04 LTS:   fig2dev                         1:3.2.6a-6ubuntu1.1   transfig                        1:3.2.6a-6ubuntu1.1In general, a standard system update will make all the necessary changes.References:   https://ubuntu.com/security/notices/USN-5864-1   CVE-2019-14275, CVE-2019-19555, CVE-2019-19797, CVE-2020-21529,   CVE-2020-21530, CVE-2020-21531, CVE-2020-21532, CVE-2020-21533,   CVE-2020-21534, CVE-2020-21535, CVE-2020-21675, CVE-2020-21676,   CVE-2021-32280, CVE-2021-3561Package Information:   https://launchpad.net/ubuntu/+source/fig2dev/1:3.2.7a-7ubuntu0.1   https://launchpad.net/ubuntu/+source/fig2dev/1:3.2.6a-6ubuntu1.1

Related news

CVE-2021-32280: Xfig / Tickets / #107 A Segmentation fault in trans_spline.c

An issue was discovered in fig2dev before 3.2.8.. A NULL pointer dereference exists in the function compute_closed_spline() located in trans_spline.c. It allows an attacker to cause Denial of Service. The fixed version of fig2dev is 3.2.8.

CVE-2020-21531: Xfig / Tickets / #63 global-buffer-overflow in conv_pattern_index() function

fig2dev 3.2.7b contains a global buffer overflow in the conv_pattern_index function in gencgm.c.

CVE-2020-21532: Xfig / Tickets / #64 global-buffer-overflow in setfigfont() function

fig2dev 3.2.7b contains a global buffer overflow in the setfigfont function in genepic.c.

CVE-2020-21529: Xfig / Tickets / #65 stack-overflow in bezier_spline function

fig2dev 3.2.7b contains a stack buffer overflow in the bezier_spline function in genepic.c.

CVE-2020-21675: Xfig / Tickets / #78 stack-buffer-overflow in genptk_text at genptk.c:618

A stack-based buffer overflow in the genptk_text component in genptk.c of fig2dev 3.2.7b allows attackers to cause a denial of service (DOS) via converting a xfig file into ptk format.

CVE-2020-21676: Xfig / Tickets / #76 stack-buffer-overflow in genpstrx_text at genpstricks.c:2732

A stack-based buffer overflow in the genpstrx_text() component in genpstricks.c of fig2dev 3.2.7b allows attackers to cause a denial of service (DOS) via converting a xfig file into pstricks format.

CVE-2021-3561: Xfig / fig2dev

An Out of Bounds flaw was found fig2dev version 3.2.8a. A flawed bounds check in read_objects() could allow an attacker to provide a crafted malicious input causing the application to either crash or in some cases cause memory corruption. The highest threat from this vulnerability is to integrity as well as system availability.

Packet Storm: Latest News

CUPS IPP Attributes LAN Remote Code Execution