CVE-2009-4227

Source
https://nvd.nist.gov/vuln/detail/CVE-2009-4227
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2009-4227.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2009-4227
Related
Published
2009-12-08T18:30:00Z
Modified
2025-04-09T00:30:58Z
Downstream
Summary
[none]
Details

Stack-based buffer overflow in the read13textobject function in freadold.c in Xfig 3.2.5b and earlier, and in the readtextobject function in read13.c in fig2dev in Transfig 3.2.5a and earlier, allows remote attackers to execute arbitrary code via a long string in a malformed .fig file that uses the 1.3 file format. NOTE: some of these details are obtained from third party information.

References

Affected packages

Debian:11 / xfig

Package

Name
xfig
Purl
pkg:deb/debian/xfig?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:3.2.5.b-1

Ecosystem specific

{
    "urgency": "low"
}

Debian:12 / xfig

Package

Name
xfig
Purl
pkg:deb/debian/xfig?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:3.2.5.b-1

Ecosystem specific

{
    "urgency": "low"
}

Debian:13 / xfig

Package

Name
xfig
Purl
pkg:deb/debian/xfig?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:3.2.5.b-1

Ecosystem specific

{
    "urgency": "low"
}