"value":"Stack-based buffer overflow in the read_1_3_textobject function in f_readold.c in Xfig 3.2.5b and earlier, and in the read_textobject function in read1_3.c in fig2dev in Transfig 3.2.5a and earlier, allows remote attackers to execute arbitrary code via a long string in a malformed .fig file that uses the 1.3 file format. NOTE: some of these details are obtained from third party information."
},
{
"lang":"es",
"value":"Desbordamiento de b\u00fafer basado en pila en la funci\u00f3n read_1_3_textobject en f_readold.c en Xfig v3.2.5b y anterior, y en la funci\u00f3n read_textobject en read1_3.c en fig2dev en Transfig v3.2.5a y anterior, permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un string largo en un archivo .fig malformado que usa el formato 1.3. NOTA: algunos de estos detalles se han obtenido de informaci\u00f3n de terceros."
"comment":"Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2009-4227\n\nThe Red Hat Security Response Team has rated this issue as having moderate security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/",