Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-46400: NULL Pointer Dereference

0
Medium
VulnerabilityCVE-2025-46400cvecve-2025-46400
Published: Wed Apr 23 2025 (04/23/2025, 20:55:17 UTC)
Source: CVE

Description

In xfig diagramming tool, a segmentation fault while running fig2dev allows an attacker to availability via local input manipulation via read_arcobject function.

AI-Powered Analysis

AILast updated: 08/31/2025, 00:37:26 UTC

Technical Analysis

CVE-2025-46400 is a vulnerability identified in the xfig diagramming tool, specifically triggered during the execution of the fig2dev utility. The issue arises from a NULL pointer dereference within the read_arcobject function, which leads to a segmentation fault. This fault results in a denial of service condition, impacting the availability of the affected system. The vulnerability is exploitable via local input manipulation, meaning an attacker must have local access to the system to trigger the fault. The CVSS 3.1 base score is 4.7, indicating a medium severity level. The vector string AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N shows that the attack vector is local, requires high attack complexity, no privileges, and user interaction. The scope is unchanged, with no confidentiality impact, but integrity is impacted, and availability is not directly affected according to the vector, though the description indicates availability impact via segmentation fault. No known exploits are reported in the wild, and no patches or vendor information are provided yet. The affected version is listed as '0', which likely indicates an unspecified or initial version. This vulnerability primarily affects local users who can manipulate input to the fig2dev tool, causing a crash and denial of service. Given the nature of the tool (xfig is a graphical diagramming utility commonly used on Unix-like systems), the impact is limited to environments where xfig and fig2dev are installed and used.

Potential Impact

For European organizations, the impact of CVE-2025-46400 is primarily a local denial of service condition affecting systems running the xfig diagramming tool and its fig2dev utility. While the vulnerability does not allow remote exploitation or direct data compromise, it can disrupt workflows that rely on xfig for diagram creation or conversion, particularly in technical, engineering, or academic environments where xfig might be used. The requirement for local access and user interaction limits the threat to insider threats or compromised user accounts. However, in environments with shared workstations or multi-user systems, an attacker could cause service interruptions or degrade productivity. Since the vulnerability affects integrity (per CVSS vector) but not confidentiality or availability directly, the main concern is the potential for data corruption or unexpected behavior in diagram processing. The lack of known exploits and patches reduces immediate risk, but organizations should be aware of the vulnerability and monitor for updates. The impact is more pronounced in organizations with heavy reliance on legacy or open-source Unix tools, which may be more common in research institutions and certain engineering firms in Europe.

Mitigation Recommendations

To mitigate CVE-2025-46400, European organizations should take the following specific actions: 1) Identify and inventory all systems running xfig and fig2dev, focusing on Unix and Linux environments. 2) Restrict local access to trusted users only, minimizing the risk of malicious input manipulation. 3) Implement strict user privilege management and session controls to prevent unauthorized local execution of fig2dev. 4) Monitor system logs and application behavior for signs of segmentation faults or crashes related to fig2dev usage. 5) Until a patch is available, consider disabling or restricting use of fig2dev in critical environments or replacing it with alternative diagramming tools that do not exhibit this vulnerability. 6) Engage with the open-source community or vendors for updates or patches addressing this issue. 7) Educate users about the risks of running untrusted input through fig2dev and enforce input validation policies where possible. These steps go beyond generic advice by focusing on access control, monitoring, and temporary operational changes tailored to the specific vulnerability and affected tool.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-04-23T20:32:36.307Z
Cisa Enriched
false
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fb1484d88663aec804

Added to database: 5/20/2025, 6:59:07 PM

Last enriched: 8/31/2025, 12:37:26 AM

Last updated: 10/16/2025, 8:27:57 AM

Views: 21

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats