First published: Fri May 19 2006(Updated: )
Format string vulnerability in Dia 0.94 allows user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code by triggering errors or warnings, as demonstrated via format string specifiers in a .bmp filename. NOTE: the original exploit was demonstrated through a command line argument, but there are other mechanisms for input that are automatically processed by Dia, such as a crafted .dia file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dia | =0.94 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-2480 is classified as a medium severity vulnerability due to its potential to cause denial of service and allow arbitrary code execution.
To fix CVE-2006-2480, upgrade to a version of Dia later than 0.94 that addresses the format string vulnerability.
CVE-2006-2480 can be exploited by triggering errors or warnings through specially crafted .bmp filenames, leading to crashes or code execution.
CVE-2006-2480 specifically affects Dia version 0.94.
Users of Dia 0.94 can be impacted if they open manipulated bitmap files that exploit this vulnerability.