Gentoo Linux Security Advisory 201412-14 - Two vulnerabilities have been found in Xfig, possibly resulting in execution of arbitrary code or Denial of Service. Versions less than 3.2.5c are affected.
c4cd03bdfcf2efbcc948e588b676a1e59d0484ec2def017bbefadbc83748ff2c
Mandriva Linux Security Advisory 2011-010 - Multiple vulnerabilities has been found and corrected in xfig. Stack-based buffer overflow in the read_1_3_textobject function in f_readold.c in Xfig 3.2.5b and earlier, and in the read_textobject function in read1_3.c in fig2dev in Transfig 3.2.5a and earlier, allows remote attackers to execute arbitrary code via a long string some of these details are obtained from third party information. Stack consumption vulnerability in u_bound.c in Xfig 3.2.5b and earlier allows remote attackers to cause a denial of service (application crash) via a long string in a malformed.fig file that uses the 1.3 file format, possibly related to the readfp_fig function in f_read.c. Stack-based buffer overflow in Xfig 3.2.4 and 3.2.5 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a FIG image with a crafted color definition.
09d1fc018db224e0d18827daac38a09a99348bd9d33232ed27421afb056fd732