Stack-based buffer overflow in the read_1_3_textobject function in
f_readold.c in Xfig 3.2.5b and earlier, and in the read_textobject function
in read1_3.c in fig2dev in Transfig 3.2.5a and earlier, allows remote
attackers to execute arbitrary code via a long string in a malformed .fig
file that uses the 1.3 file format. NOTE: some of these details are
obtained from third party information.
Source: xfig (LP Ubuntu Debian)
Upstream:released (1:3.2.5.b-1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was needed)
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was needed)
Ubuntu 16.04 LTS (Xenial Xerus):needed
Ubuntu 18.04 LTS (Bionic Beaver):needed
Ubuntu 20.04 LTS (Focal Fossa):needed
Ubuntu 20.10 (Groovy Gorilla):needed
More Information

Updated: 2020-07-28 18:14:30 UTC (commit 7b6828437fde0509248708fcdb5b0f7587b85bd1)