Vulnerabilities > CVE-2005-2966 - Remote Arbitrary Code Execution vulnerability in DIA 0.91/0.92.2/0.93
Attack vector
NETWORK Attack complexity
HIGH Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
The Python SVG import plugin (diasvg_import.py) for DIA 0.94 and earlier allows user-assisted attackers to execute arbitrary commands via a crafted SVG file.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 4 |
Nessus
NASL family Gentoo Local Security Checks NASL id GENTOO_GLSA-200510-06.NASL description The remote host is affected by the vulnerability described in GLSA-200510-06 (Dia: Arbitrary code execution through SVG import) Joxean Koret discovered that the SVG import plugin in Dia fails to properly sanitise data read from an SVG file. Impact : An attacker could create a specially crafted SVG file, which, when imported into Dia, could lead to the execution of arbitrary code. Workaround : There is no known workaround at this time. last seen 2020-06-01 modified 2020-06-02 plugin id 19976 published 2005-10-11 reporter This script is Copyright (C) 2005-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/19976 title GLSA-200510-06 : Dia: Arbitrary code execution through SVG import NASL family Ubuntu Local Security Checks NASL id UBUNTU_USN-193-1.NASL description Joxean Koret discovered that the SVG import plugin did not properly sanitise data read from an SVG file. By tricking an user into opening a specially crafted SVG file, an attacker could exploit this to execute arbitrary code with the privileges of the user. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 20607 published 2006-01-15 reporter Ubuntu Security Notice (C) 2005-2019 Canonical, Inc. / NASL script (C) 2006-2016 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/20607 title Ubuntu 5.04 : dia vulnerability (USN-193-1) NASL family Mandriva Local Security Checks NASL id MANDRAKE_MDKSA-2005-187.NASL description Joxean Koret discovered that the Python SVG import plugin in dia, a vector-oriented diagram editor, does not properly sanitise data read from an SVG file and is hence vulnerable to execute arbitrary Python code. The updated packages have been patched to address this issue. last seen 2020-06-01 modified 2020-06-02 plugin id 20432 published 2006-01-15 reporter This script is Copyright (C) 2006-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/20432 title Mandrake Linux Security Advisory : dia (MDKSA-2005:187) NASL family Debian Local Security Checks NASL id DEBIAN_DSA-1025.NASL description 'infamous41md last seen 2020-06-01 modified 2020-06-02 plugin id 22567 published 2006-10-14 reporter This script is Copyright (C) 2006-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/22567 title Debian DSA-1025-1 : dia - programming error NASL family Debian Local Security Checks NASL id DEBIAN_DSA-847.NASL description Joxean Koret discovered that the Python SVG import plugin in dia, a vector-oriented diagram editor, does not properly sanitise data read from an SVG file and is hence vulnerable to execute arbitrary Python code. last seen 2020-06-01 modified 2020-06-02 plugin id 19955 published 2005-10-11 reporter This script is Copyright (C) 2005-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/19955 title Debian DSA-847-1 : dia - missing input sanitising
References
- http://secunia.com/advisories/17047
- http://secunia.com/advisories/17059
- http://secunia.com/advisories/17083
- http://secunia.com/advisories/17095
- http://secunia.com/advisories/17108
- http://www.debian.org/security/2005/dsa-847
- http://www.debian.org/security/2006/dsa-1025
- http://www.gentoo.org/security/en/glsa/glsa-200510-06.xml
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:187
- http://www.novell.com/linux/security/advisories/2005_22_sr.html
- http://www.securityfocus.com/bid/15000
- http://www.vupen.com/english/advisories/2005/1950
- https://usn.ubuntu.com/193-1/