Dia: Format string vulnerabilities
Gentoo Linux Security Advisory
||GLSA 200606-03 / dia
||June 07, 2006
||June 07, 2006: 01
All supported architectures
Format string vulnerabilities in Dia may lead to the execution of arbitrary
Dia is a GTK+ based diagram creation program.
KaDaL-X discovered a format string error within the handling of
filenames. Hans de Goede also discovered several other format
string errors in the processing of dia files.
By enticing a user to open a specially crafted file, a remote
attacker could exploit these vulnerabilities to execute arbitrary code
with the rights of the user running the application.
There is no known workaround at this time.
All Dia users should upgrade to the latest available version:
Code Listing 3.1: Resolution
# emerge --sync
# emerge --ask --oneshot --verbose ">=app-office/dia-0.95.1"