Description
Format string vulnerability in Dia 0.94 allows user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code by triggering errors or warnings, as demonstrated via format string specifiers in a .bmp filename. NOTE: the original exploit was demonstrated through a command line argument, but there are other mechanisms for input that are automatically processed by Dia, such as a crafted .dia file.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Ubuntu USN |
USN-286-1 | Dia vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T17:51:04.651Z
Reserved: 2006-05-19T00:00:00.000Z
Link: CVE-2006-2480
No data.
Status : Modified
Published: 2006-05-19T21:02:00.000
Modified: 2026-04-16T00:27:16.627
Link: CVE-2006-2480
OpenCVE Enrichment
No data.
Weaknesses
Ubuntu USN