Stack-based buffer overflow in the read_1_3_textobject function in
f_readold.c in Xfig 3.2.5b and earlier, and in the read_textobject function
in read1_3.c in fig2dev in Transfig 3.2.5a and earlier, allows remote
attackers to execute arbitrary code via a long string in a malformed .fig
file that uses the 1.3 file format. NOTE: some of these details are
obtained from third party information.
Source: xfig (LP Ubuntu Debian)
Upstream:released (1:3.2.5.b-1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was needed)
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was needed)
Ubuntu 16.04 LTS (Xenial Xerus):needed
Ubuntu 18.04 LTS (Bionic Beaver):needed
Ubuntu 19.04 (Disco Dingo):needed
Ubuntu 19.10 (Eoan):needed
More Information

Updated: 2019-08-23 07:14:31 UTC (commit 436fd4ed4cf0038ddd382cb8649607ace163dda7)