Bug 657981

Summary: xfig buffer overflow when opening .fig file with malicious colour definition
Product: Red Hat Enterprise Linux 5 Reporter: underground-stockholm <underground-stockholm>
Component: xfigAssignee: Stanislav Ochotnicky <sochotni>
Status: CLOSED DUPLICATE QA Contact: desktop-bugs <desktop-bugs>
Severity: medium Docs Contact:
Priority: low    
Version: 5.5CC: jlieskov
Target Milestone: rc   
Target Release: ---   
Hardware: i686   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2011-03-01 17:06:49 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 659676    
Attachments:
Description Flags
.FIG file that shows the problem none

Description underground-stockholm 2010-11-29 01:25:08 UTC
Created attachment 463393 [details]
.FIG file that shows the problem

Description of problem:

xfig has a buffer overflow, when opening .fig files with malicious colour definitions. It will cause crashes and potential execution of arbitrary code.

Version-Release number of selected component (if applicable):
3.2.4-21.3

How reproducible:
100%

Steps to Reproduce:
1. Start xfig with the attached file as a parameter on the command line, or start xfig and open the attached file.
2.
3.
  
Actual results:
Segmentation fault

Expected results:
Normal open

Additional info:

-- Frank | Underground Stockholm | http://underground-stockholm.com/

Comment 1 RHEL Program Management 2011-01-11 20:07:15 UTC
This request was evaluated by Red Hat Product Management for
inclusion in the current release of Red Hat Enterprise Linux.
Because the affected component is not scheduled to be updated in the
current release, Red Hat is unfortunately unable to address this
request at this time. Red Hat invites you to ask your support
representative to propose this request, if appropriate and relevant,
in the next release of Red Hat Enterprise Linux.

Comment 2 RHEL Program Management 2011-01-12 15:24:04 UTC
This request was erroneously denied for the current release of
Red Hat Enterprise Linux.  The error has been fixed and this
request has been re-proposed for the current release.

Comment 3 Jan Lieskovsky 2011-03-01 17:06:49 UTC
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4262 is the primary
bug we are dealing (and which should be referenced to) wrt to dealing
with  this security flaw. Closing this one.

*** This bug has been marked as a duplicate of bug 659676 ***