Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-31163: CWE-476 in xfig fig2dev

0
Medium
VulnerabilityCVE-2025-31163cvecve-2025-31163cwe-476
Published: Fri Mar 28 2025 (03/28/2025, 18:01:24 UTC)
Source: CVE Database V5
Vendor/Project: xfig
Product: fig2dev

Description

Segmentation fault in fig2dev in version 3.2.9a allows an attacker to availability via local input manipulation via put_patternarc function.

AI-Powered Analysis

AILast updated: 11/03/2025, 21:19:22 UTC

Technical Analysis

CVE-2025-31163 is a vulnerability identified in the fig2dev utility, part of the xfig suite used for converting fig files into various graphical formats. The flaw is a null pointer dereference (CWE-476) occurring in the put_patternarc function, which handles pattern arcs in graphical rendering. When fig2dev processes crafted input locally, the function may attempt to dereference a null pointer, causing a segmentation fault and crashing the application. This results in a denial of service (DoS) condition affecting availability. The vulnerability affects version 3.2.9a of fig2dev and requires local access with low privileges (AV:L, PR:L) and no user interaction (UI:N). The CVSS v3.1 base score is 6.6, reflecting medium severity due to the high impact on availability but limited impact on confidentiality and integrity. The scope is unchanged (S:U), meaning the vulnerability affects only the local application instance. No patches or exploits are currently known, but the vulnerability has been publicly disclosed. The issue arises from improper handling of input data leading to dereferencing a null pointer, a common programming error that can be exploited to crash software. Given fig2dev’s role in graphical file conversions, the disruption could impact workflows relying on automated or manual use of this tool.

Potential Impact

For European organizations, the primary impact is a denial of service on systems running fig2dev 3.2.9a locally. This could disrupt workflows in academic, research, or engineering environments where xfig is used for graphical conversions. While the vulnerability does not allow remote exploitation or privilege escalation, local users with low privileges could crash the application, potentially interrupting batch processing or automated pipelines. Confidentiality and integrity impacts are minimal, but availability interruptions could cause delays or require manual intervention. Organizations with strict uptime requirements or automated graphical processing may experience operational inefficiencies. Since exploitation requires local access, insider threats or compromised user accounts pose the main risk vectors. The absence of known exploits reduces immediate risk but patching is recommended to prevent future abuse.

Mitigation Recommendations

1. Monitor for official patches or updates from the xfig project and apply them promptly once available. 2. Restrict local access to systems running fig2dev to trusted users only, minimizing the risk of malicious input. 3. Implement application whitelisting and user privilege restrictions to prevent unauthorized execution of fig2dev. 4. Use input validation or sandboxing techniques when processing fig files to detect or isolate malformed inputs. 5. Incorporate monitoring and alerting for unexpected crashes of fig2dev to enable rapid response. 6. For critical environments, consider replacing fig2dev with alternative tools that do not exhibit this vulnerability. 7. Educate users on safe handling of graphical files and the risks of processing untrusted inputs locally. 8. Maintain regular backups and recovery procedures to mitigate operational disruptions caused by DoS conditions.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat-cnalr
Date Reserved
2025-03-27T02:44:50.788Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69091549c28fd46ded7bb752

Added to database: 11/3/2025, 8:49:13 PM

Last enriched: 11/3/2025, 9:19:22 PM

Last updated: 12/20/2025, 2:07:44 AM

Views: 27

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats