CVE-2018-19492
https://notcve.org/view.php?id=CVE-2018-19492
An issue was discovered in cairo.trm in Gnuplot 5.2.5. This issue allows an attacker to conduct a buffer overflow with an arbitrary amount of data in the cairotrm_options function. This flaw is caused by a missing size check of an argument passed to the "set font" function. This issue occurs when the Gnuplot pngcairo terminal is used as a backend. Se ha descubierto un problema en cairo.trm en Gnuplot 5.2.5. • http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00066.html https://lists.debian.org/debian-lts-announce/2018/11/msg00031.html https://lists.debian.org/debian-lts-announce/2018/11/msg00035.html https://sourceforge.net/p/gnuplot/bugs/2089 https://sourceforge.net/p/gnuplot/gnuplot-main/ci/d5020716834582b20a5e12cdd49f39ee4f9dd949 https://usn.ubuntu.com/4541-1 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2018-19490
https://notcve.org/view.php?id=CVE-2018-19490
An issue was discovered in datafile.c in Gnuplot 5.2.5. This issue allows an attacker to conduct a heap-based buffer overflow with an arbitrary amount of data in df_generate_ascii_array_entry. To exploit this vulnerability, an attacker must pass an overlong string as the right bound of the range argument that is passed to the plot function. Se ha descubierto un problema en Gnuplot 5.2.5. Este problema permite a un atacante realizar un desbordamiento de búfer basado en memoria dinámica (heap) con una cantidad arbitraria de datos en df_generate_ascii_array_entry. • http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00066.html https://lists.debian.org/debian-lts-announce/2018/11/msg00031.html https://lists.debian.org/debian-lts-announce/2018/11/msg00035.html https://sourceforge.net/p/gnuplot/bugs/2093 https://sourceforge.net/p/gnuplot/gnuplot-main/ci/d5020716834582b20a5e12cdd49f39ee4f9dd949 https://usn.ubuntu.com/4541-1 • CWE-787: Out-of-bounds Write •
CVE-2018-19491
https://notcve.org/view.php?id=CVE-2018-19491
An issue was discovered in post.trm in Gnuplot 5.2.5. This issue allows an attacker to conduct a buffer overflow with an arbitrary amount of data in the PS_options function. This flaw is caused by a missing size check of an argument passed to the "set font" function. This issue occurs when the Gnuplot postscript terminal is used as a backend. Se ha descubierto un problema en post.trm en Gnuplot 5.2.5. • http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00066.html https://lists.debian.org/debian-lts-announce/2018/11/msg00031.html https://lists.debian.org/debian-lts-announce/2018/11/msg00035.html https://sourceforge.net/p/gnuplot/bugs/2094 https://sourceforge.net/p/gnuplot/gnuplot-main/ci/d5020716834582b20a5e12cdd49f39ee4f9dd949 https://usn.ubuntu.com/4541-1 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •