- ---------------------------------------------------------------------                   Red Hat Security Advisory

Synopsis:          Moderate: dia security update
Advisory ID:       RHSA-2006:0280-01
Advisory URL:      https://access.redhat.com/errata/RHSA-2006:0280.html
Issue date:        2006-05-03
Updated on:        2006-05-03
Product:           Red Hat Enterprise Linux
CVE Names:         CVE-2006-1550 
- ---------------------------------------------------------------------1. Summary:

An updated Dia package that fixes several buffer overflow bugs are now
available.

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64
Red Hat Linux Advanced Workstation 2.1 - ia64
Red Hat Enterprise Linux ES version 2.1 - i386
Red Hat Enterprise Linux WS version 2.1 - i386
Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Enterprise Linux Desktop version 4 - i386, x86_64
Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64

3. Problem description:

The Dia drawing program is designed to draw various types of diagrams.

infamous41md discovered three buffer overflow bugs in Dia's xfig file
format importer. If an attacker is able to trick a Dia user into opening a
carefully crafted xfig file, it may be possible to execute arbitrary code
as the user running Dia. (CVE-2006-1550)

Users of Dia should update to these erratum packages, which contain
backported patches and are not vulnerable to these issues.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via Red Hat Network.  To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

5. Bug IDs fixed (http://bugzilla.redhat.com/):

187401 - CVE-2006-1550 Dia multiple buffer overflows

6. RPMs required:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1:

SRPMS:
a2bcfd1db5b67912d03cc8377d0efa4e  dia-0.88.1-3.3.src.rpm

i386:
3a1e3f98594ec1039dbcc4055d2d6426  dia-0.88.1-3.3.i386.rpm

ia64:
f0fc2b254fcabcf6aa4e8e0ea94f02f9  dia-0.88.1-3.3.ia64.rpm

Red Hat Linux Advanced Workstation 2.1:

SRPMS:
a2bcfd1db5b67912d03cc8377d0efa4e  dia-0.88.1-3.3.src.rpm

ia64:
f0fc2b254fcabcf6aa4e8e0ea94f02f9  dia-0.88.1-3.3.ia64.rpm

Red Hat Enterprise Linux ES version 2.1:

SRPMS:
a2bcfd1db5b67912d03cc8377d0efa4e  dia-0.88.1-3.3.src.rpm

i386:
3a1e3f98594ec1039dbcc4055d2d6426  dia-0.88.1-3.3.i386.rpm

Red Hat Enterprise Linux WS version 2.1:

SRPMS:
a2bcfd1db5b67912d03cc8377d0efa4e  dia-0.88.1-3.3.src.rpm

i386:
3a1e3f98594ec1039dbcc4055d2d6426  dia-0.88.1-3.3.i386.rpm

Red Hat Enterprise Linux AS version 4:

SRPMS:
97d5aaa13d19483c21cbc329dc00001b  dia-0.94-5.4.src.rpm

i386:
6ee8860a0ba1fb695198f9562f422473  dia-0.94-5.4.i386.rpm
04f3ac7cb40626b4836dfd4a45135276  dia-debuginfo-0.94-5.4.i386.rpm

ia64:
03205912eecd5ae3f2d65f91769593a3  dia-0.94-5.4.ia64.rpm
e572ed6ba3b0d936cc38c0de14ebae88  dia-debuginfo-0.94-5.4.ia64.rpm

ppc:
af35c1218f2bede5aa806b8a335b2715  dia-0.94-5.4.ppc.rpm
e93f1a08b58a636e8e55a538776d2d52  dia-debuginfo-0.94-5.4.ppc.rpm

s390:
c59cce80c5e6b5a3f0564abe61098156  dia-0.94-5.4.s390.rpm
03159e17a741914c405d88ae6b5dea43  dia-debuginfo-0.94-5.4.s390.rpm

s390x:
25656c7e6ab95af3f159bd25f8002627  dia-0.94-5.4.s390x.rpm
82df44848401aa6fcb162b3a874aff55  dia-debuginfo-0.94-5.4.s390x.rpm

x86_64:
3fac8491faa94d85be7b13e9d16ad1fb  dia-0.94-5.4.x86_64.rpm
3e41ac343a6fcb2c589863020ecbe139  dia-debuginfo-0.94-5.4.x86_64.rpm

Red Hat Enterprise Linux Desktop version 4:

SRPMS:
97d5aaa13d19483c21cbc329dc00001b  dia-0.94-5.4.src.rpm

i386:
6ee8860a0ba1fb695198f9562f422473  dia-0.94-5.4.i386.rpm
04f3ac7cb40626b4836dfd4a45135276  dia-debuginfo-0.94-5.4.i386.rpm

x86_64:
3fac8491faa94d85be7b13e9d16ad1fb  dia-0.94-5.4.x86_64.rpm
3e41ac343a6fcb2c589863020ecbe139  dia-debuginfo-0.94-5.4.x86_64.rpm

Red Hat Enterprise Linux ES version 4:

SRPMS:
97d5aaa13d19483c21cbc329dc00001b  dia-0.94-5.4.src.rpm

i386:
6ee8860a0ba1fb695198f9562f422473  dia-0.94-5.4.i386.rpm
04f3ac7cb40626b4836dfd4a45135276  dia-debuginfo-0.94-5.4.i386.rpm

ia64:
03205912eecd5ae3f2d65f91769593a3  dia-0.94-5.4.ia64.rpm
e572ed6ba3b0d936cc38c0de14ebae88  dia-debuginfo-0.94-5.4.ia64.rpm

x86_64:
3fac8491faa94d85be7b13e9d16ad1fb  dia-0.94-5.4.x86_64.rpm
3e41ac343a6fcb2c589863020ecbe139  dia-debuginfo-0.94-5.4.x86_64.rpm

Red Hat Enterprise Linux WS version 4:

SRPMS:
97d5aaa13d19483c21cbc329dc00001b  dia-0.94-5.4.src.rpm

i386:
6ee8860a0ba1fb695198f9562f422473  dia-0.94-5.4.i386.rpm
04f3ac7cb40626b4836dfd4a45135276  dia-debuginfo-0.94-5.4.i386.rpm

ia64:
03205912eecd5ae3f2d65f91769593a3  dia-0.94-5.4.ia64.rpm
e572ed6ba3b0d936cc38c0de14ebae88  dia-debuginfo-0.94-5.4.ia64.rpm

x86_64:
3fac8491faa94d85be7b13e9d16ad1fb  dia-0.94-5.4.x86_64.rpm
3e41ac343a6fcb2c589863020ecbe139  dia-debuginfo-0.94-5.4.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1550
http://www.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is .  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2006 Red Hat, Inc.

RedHat: Moderate: dia security update RHSA-2006:0280-01

An updated Dia package that fixes several buffer overflow bugs are now available. This update has been rated as having moderate security impact by the Red Hat Security Response ...

Summary



Summary

The Dia drawing program is designed to draw various types of diagrams. infamous41md discovered three buffer overflow bugs in Dia's xfig file format importer. If an attacker is able to trick a Dia user into opening a carefully crafted xfig file, it may be possible to execute arbitrary code as the user running Dia. (CVE-2006-1550) Users of Dia should update to these erratum packages, which contain backported patches and are not vulnerable to these issues.


Solution

Before applying this update, make sure all previously released errata relevant to your system have been applied.
This update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command:
up2date
This will start an interactive process that will result in the appropriate RPMs being upgraded on your system.
5. Bug IDs fixed (http://bugzilla.redhat.com/):
187401 - CVE-2006-1550 Dia multiple buffer overflows
6. RPMs required:
Red Hat Enterprise Linux AS (Advanced Server) version 2.1:
SRPMS: a2bcfd1db5b67912d03cc8377d0efa4e dia-0.88.1-3.3.src.rpm
i386: 3a1e3f98594ec1039dbcc4055d2d6426 dia-0.88.1-3.3.i386.rpm
ia64: f0fc2b254fcabcf6aa4e8e0ea94f02f9 dia-0.88.1-3.3.ia64.rpm
Red Hat Linux Advanced Workstation 2.1:
SRPMS: a2bcfd1db5b67912d03cc8377d0efa4e dia-0.88.1-3.3.src.rpm
ia64: f0fc2b254fcabcf6aa4e8e0ea94f02f9 dia-0.88.1-3.3.ia64.rpm
Red Hat Enterprise Linux ES version 2.1:
SRPMS: a2bcfd1db5b67912d03cc8377d0efa4e dia-0.88.1-3.3.src.rpm
i386: 3a1e3f98594ec1039dbcc4055d2d6426 dia-0.88.1-3.3.i386.rpm
Red Hat Enterprise Linux WS version 2.1:
SRPMS: a2bcfd1db5b67912d03cc8377d0efa4e dia-0.88.1-3.3.src.rpm
i386: 3a1e3f98594ec1039dbcc4055d2d6426 dia-0.88.1-3.3.i386.rpm
Red Hat Enterprise Linux AS version 4:
SRPMS: 97d5aaa13d19483c21cbc329dc00001b dia-0.94-5.4.src.rpm
i386: 6ee8860a0ba1fb695198f9562f422473 dia-0.94-5.4.i386.rpm 04f3ac7cb40626b4836dfd4a45135276 dia-debuginfo-0.94-5.4.i386.rpm
ia64: 03205912eecd5ae3f2d65f91769593a3 dia-0.94-5.4.ia64.rpm e572ed6ba3b0d936cc38c0de14ebae88 dia-debuginfo-0.94-5.4.ia64.rpm
ppc: af35c1218f2bede5aa806b8a335b2715 dia-0.94-5.4.ppc.rpm e93f1a08b58a636e8e55a538776d2d52 dia-debuginfo-0.94-5.4.ppc.rpm
s390: c59cce80c5e6b5a3f0564abe61098156 dia-0.94-5.4.s390.rpm 03159e17a741914c405d88ae6b5dea43 dia-debuginfo-0.94-5.4.s390.rpm
s390x: 25656c7e6ab95af3f159bd25f8002627 dia-0.94-5.4.s390x.rpm 82df44848401aa6fcb162b3a874aff55 dia-debuginfo-0.94-5.4.s390x.rpm
x86_64: 3fac8491faa94d85be7b13e9d16ad1fb dia-0.94-5.4.x86_64.rpm 3e41ac343a6fcb2c589863020ecbe139 dia-debuginfo-0.94-5.4.x86_64.rpm
Red Hat Enterprise Linux Desktop version 4:
SRPMS: 97d5aaa13d19483c21cbc329dc00001b dia-0.94-5.4.src.rpm
i386: 6ee8860a0ba1fb695198f9562f422473 dia-0.94-5.4.i386.rpm 04f3ac7cb40626b4836dfd4a45135276 dia-debuginfo-0.94-5.4.i386.rpm
x86_64: 3fac8491faa94d85be7b13e9d16ad1fb dia-0.94-5.4.x86_64.rpm 3e41ac343a6fcb2c589863020ecbe139 dia-debuginfo-0.94-5.4.x86_64.rpm
Red Hat Enterprise Linux ES version 4:
SRPMS: 97d5aaa13d19483c21cbc329dc00001b dia-0.94-5.4.src.rpm
i386: 6ee8860a0ba1fb695198f9562f422473 dia-0.94-5.4.i386.rpm 04f3ac7cb40626b4836dfd4a45135276 dia-debuginfo-0.94-5.4.i386.rpm
ia64: 03205912eecd5ae3f2d65f91769593a3 dia-0.94-5.4.ia64.rpm e572ed6ba3b0d936cc38c0de14ebae88 dia-debuginfo-0.94-5.4.ia64.rpm
x86_64: 3fac8491faa94d85be7b13e9d16ad1fb dia-0.94-5.4.x86_64.rpm 3e41ac343a6fcb2c589863020ecbe139 dia-debuginfo-0.94-5.4.x86_64.rpm
Red Hat Enterprise Linux WS version 4:
SRPMS: 97d5aaa13d19483c21cbc329dc00001b dia-0.94-5.4.src.rpm
i386: 6ee8860a0ba1fb695198f9562f422473 dia-0.94-5.4.i386.rpm 04f3ac7cb40626b4836dfd4a45135276 dia-debuginfo-0.94-5.4.i386.rpm
ia64: 03205912eecd5ae3f2d65f91769593a3 dia-0.94-5.4.ia64.rpm e572ed6ba3b0d936cc38c0de14ebae88 dia-debuginfo-0.94-5.4.ia64.rpm
x86_64: 3fac8491faa94d85be7b13e9d16ad1fb dia-0.94-5.4.x86_64.rpm 3e41ac343a6fcb2c589863020ecbe139 dia-debuginfo-0.94-5.4.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package

References

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1550 http://www.redhat.com/security/updates/classification/#moderate

Package List


Severity
Advisory ID: RHSA-2006:0280-01
Advisory URL: https://access.redhat.com/errata/RHSA-2006:0280.html
Issued Date: : 2006-05-03
Updated on: 2006-05-03
Product: Red Hat Enterprise Linux
CVE Names: CVE-2006-1550 An updated Dia package that fixes several buffer overflow bugs are now available. This update has been rated as having moderate security impact by the Red Hat Security Response Team.

Topic


Topic


 

Relevant Releases Architectures

Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64

Red Hat Linux Advanced Workstation 2.1 - ia64

Red Hat Enterprise Linux ES version 2.1 - i386

Red Hat Enterprise Linux WS version 2.1 - i386

Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64

Red Hat Enterprise Linux Desktop version 4 - i386, x86_64

Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64

Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64


Bugs Fixed


Related News