CVE-2009-1962

Source
https://nvd.nist.gov/vuln/detail/CVE-2009-1962
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2009-1962.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2009-1962
Related
Published
2009-06-08T01:00:00Z
Modified
2024-11-21T01:03:48Z
Summary
[none]
Details

Xfig, possibly 3.2.5, allows local users to read and write arbitrary files via a symlink attack on the (1) xfig-eps[PID], (2) xfig-pic[PID].pix, (3) xfig-pic[PID].err, (4) xfig-pcx[PID].pix, (5) xfig-xfigrc[PID], (6) xfig[PID], (7) xfig-print[PID], (8) xfig-export[PID].err, (9) xfig-batch[PID], (10) xfig-exp[PID], or (11) xfig-spell.[PID] temporary files, where [PID] is a process ID.

References

Affected packages

Debian:11 / xfig

Package

Name
xfig
Purl
pkg:deb/debian/xfig?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:3.2.5.a-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / xfig

Package

Name
xfig
Purl
pkg:deb/debian/xfig?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:3.2.5.a-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / xfig

Package

Name
xfig
Purl
pkg:deb/debian/xfig?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:3.2.5.a-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}