Vulnerability CVE-2014-1236


Published: 2014-01-10

Description:
Stack-based buffer overflow in the chkNum function in lib/cgraph/scan.l in Graphviz 2.34.0 allows remote attackers to have unspecified impact via vectors related to a "badly formed number" and a "long digit list."

See advisories in our WLB2 database:
Topic
Author
Date
High
graphviz Multiple buffer overflow chkNum and sprintf
Sebastian
11.01.2014

Type:

CWE-119

(Improper Restriction of Operations within the Bounds of a Memory Buffer)

CVSS2 => (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
10/10
10/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Graphviz -> Graphviz 

 References:
http://seclists.org/oss-sec/2014/q1/46
http://seclists.org/oss-sec/2014/q1/51
http://seclists.org/oss-sec/2014/q1/54
http://www.debian.org/security/2014/dsa-2843
http://www.mandriva.com/security/advisories?name=MDVSA-2014:024
http://www.securityfocus.com/bid/64737
https://bugzilla.redhat.com/show_bug.cgi?id=1050872
https://github.com/ellson/graphviz/commit/1d1bdec6318746f6f19f245db589eddc887ae8ff
https://security.gentoo.org/glsa/201702-06

Copyright 2024, cxsecurity.com

 

Back to Top