CVE-2025-31163: CWE-476 in xfig fig2dev
Segmentation fault in fig2dev in version 3.2.9a allows an attacker to availability via local input manipulation via put_patternarc function.
AI Analysis
Technical Summary
CVE-2025-31163 is a vulnerability identified in the fig2dev utility, part of the xfig suite used for converting fig files into various graphical formats. The flaw is a null pointer dereference (CWE-476) occurring in the put_patternarc function, which handles pattern arcs in graphical rendering. When fig2dev processes crafted input locally, the function may attempt to dereference a null pointer, causing a segmentation fault and crashing the application. This results in a denial of service (DoS) condition affecting availability. The vulnerability affects version 3.2.9a of fig2dev and requires local access with low privileges (AV:L, PR:L) and no user interaction (UI:N). The CVSS v3.1 base score is 6.6, reflecting medium severity due to the high impact on availability but limited impact on confidentiality and integrity. The scope is unchanged (S:U), meaning the vulnerability affects only the local application instance. No patches or exploits are currently known, but the vulnerability has been publicly disclosed. The issue arises from improper handling of input data leading to dereferencing a null pointer, a common programming error that can be exploited to crash software. Given fig2dev’s role in graphical file conversions, the disruption could impact workflows relying on automated or manual use of this tool.
Potential Impact
For European organizations, the primary impact is a denial of service on systems running fig2dev 3.2.9a locally. This could disrupt workflows in academic, research, or engineering environments where xfig is used for graphical conversions. While the vulnerability does not allow remote exploitation or privilege escalation, local users with low privileges could crash the application, potentially interrupting batch processing or automated pipelines. Confidentiality and integrity impacts are minimal, but availability interruptions could cause delays or require manual intervention. Organizations with strict uptime requirements or automated graphical processing may experience operational inefficiencies. Since exploitation requires local access, insider threats or compromised user accounts pose the main risk vectors. The absence of known exploits reduces immediate risk but patching is recommended to prevent future abuse.
Mitigation Recommendations
1. Monitor for official patches or updates from the xfig project and apply them promptly once available. 2. Restrict local access to systems running fig2dev to trusted users only, minimizing the risk of malicious input. 3. Implement application whitelisting and user privilege restrictions to prevent unauthorized execution of fig2dev. 4. Use input validation or sandboxing techniques when processing fig files to detect or isolate malformed inputs. 5. Incorporate monitoring and alerting for unexpected crashes of fig2dev to enable rapid response. 6. For critical environments, consider replacing fig2dev with alternative tools that do not exhibit this vulnerability. 7. Educate users on safe handling of graphical files and the risks of processing untrusted inputs locally. 8. Maintain regular backups and recovery procedures to mitigate operational disruptions caused by DoS conditions.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2025-31163: CWE-476 in xfig fig2dev
Description
Segmentation fault in fig2dev in version 3.2.9a allows an attacker to availability via local input manipulation via put_patternarc function.
AI-Powered Analysis
Technical Analysis
CVE-2025-31163 is a vulnerability identified in the fig2dev utility, part of the xfig suite used for converting fig files into various graphical formats. The flaw is a null pointer dereference (CWE-476) occurring in the put_patternarc function, which handles pattern arcs in graphical rendering. When fig2dev processes crafted input locally, the function may attempt to dereference a null pointer, causing a segmentation fault and crashing the application. This results in a denial of service (DoS) condition affecting availability. The vulnerability affects version 3.2.9a of fig2dev and requires local access with low privileges (AV:L, PR:L) and no user interaction (UI:N). The CVSS v3.1 base score is 6.6, reflecting medium severity due to the high impact on availability but limited impact on confidentiality and integrity. The scope is unchanged (S:U), meaning the vulnerability affects only the local application instance. No patches or exploits are currently known, but the vulnerability has been publicly disclosed. The issue arises from improper handling of input data leading to dereferencing a null pointer, a common programming error that can be exploited to crash software. Given fig2dev’s role in graphical file conversions, the disruption could impact workflows relying on automated or manual use of this tool.
Potential Impact
For European organizations, the primary impact is a denial of service on systems running fig2dev 3.2.9a locally. This could disrupt workflows in academic, research, or engineering environments where xfig is used for graphical conversions. While the vulnerability does not allow remote exploitation or privilege escalation, local users with low privileges could crash the application, potentially interrupting batch processing or automated pipelines. Confidentiality and integrity impacts are minimal, but availability interruptions could cause delays or require manual intervention. Organizations with strict uptime requirements or automated graphical processing may experience operational inefficiencies. Since exploitation requires local access, insider threats or compromised user accounts pose the main risk vectors. The absence of known exploits reduces immediate risk but patching is recommended to prevent future abuse.
Mitigation Recommendations
1. Monitor for official patches or updates from the xfig project and apply them promptly once available. 2. Restrict local access to systems running fig2dev to trusted users only, minimizing the risk of malicious input. 3. Implement application whitelisting and user privilege restrictions to prevent unauthorized execution of fig2dev. 4. Use input validation or sandboxing techniques when processing fig files to detect or isolate malformed inputs. 5. Incorporate monitoring and alerting for unexpected crashes of fig2dev to enable rapid response. 6. For critical environments, consider replacing fig2dev with alternative tools that do not exhibit this vulnerability. 7. Educate users on safe handling of graphical files and the risks of processing untrusted inputs locally. 8. Maintain regular backups and recovery procedures to mitigate operational disruptions caused by DoS conditions.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- redhat-cnalr
- Date Reserved
- 2025-03-27T02:44:50.788Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69091549c28fd46ded7bb752
Added to database: 11/3/2025, 8:49:13 PM
Last enriched: 11/3/2025, 9:19:22 PM
Last updated: 12/20/2025, 2:07:44 AM
Views: 27
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-8065: CWE-400 Uncontrolled Resource Consumption in TP-Link Systems Inc. Tapo C200 V3
HighCVE-2025-14300: CWE-306 Missing Authentication for Critical Function in TP-Link Systems Inc. Tapo C200 V3
HighCVE-2025-14299: CWE-770 Allocation of Resources Without Limits or Throttling in TP-Link Systems Inc. Tapo C200 V3
HighCVE-2025-68613: CWE-913: Improper Control of Dynamically-Managed Code Resources in n8n-io n8n
CriticalCVE-2023-53959: Uncontrolled Search Path Element in filezilla-project FileZilla Client
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.