5 results (0.013 seconds)

CVSS: 7.8EPSS: 0%CPEs: 5EXPL: 1

Buffer Overflow in Graphviz Graph Visualization Tools from commit ID f8b9e035 and earlier allows remote attackers to execute arbitrary code or cause a denial of service (application crash) by loading a crafted file into the "lib/common/shapes.c" component. Un Desbordamiento de Búfer en Graphviz Graph Visualization Tools desde el ID del commit f8b9e035 y versiones anteriores, permite a atacantes remotos ejecutar código arbitrario o provocar una denegación de servicio (bloqueo de la aplicación) al cargar un archivo diseñado en el componente "lib/common/shapes.c" A flaw was found in graphviz. A wrong assumption in record_init function leads to an off-by-one write in parse_reclbl function, allowing an attacker who can provide graph input to potentially execute code when the label of a node is invalid and shorter than two characters. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. • https://gitlab.com/graphviz/graphviz/-/issues/1700 https://lists.debian.org/debian-lts-announce/2021/05/msg00014.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D5PQPHJHPU46FK3R5XBP3XDT4X37HMPC https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QGY2IGARE6RZHTF2UEZEWLMQCDILFK6A https://security.gentoo.org/glsa/202107-04 https://www.debian.org/security/2021/dsa-4914 https://access.redhat.com/security/cve/CVE-2020-18032 ht • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') CWE-193: Off-by-one Error •

CVSS: 7.5EPSS: 1%CPEs: 3EXPL: 3

Format string vulnerability in the yyerror function in lib/cgraph/scan.l in Graphviz allows remote attackers to have unspecified impact via format string specifiers in unknown vectors, which are not properly handled in an error string. Vulnerabilidad de formato de cadena en la función yyerror en ib/cgraph/scan.l en Graphviz permite a atacantes remotos tener un impacto no especificado a través de especificadores de formatos de cadena en vectores desconocidos, que no están manejados correctamente en una cadena error. • http://advisories.mageia.org/MGASA-2014-0520.html http://seclists.org/oss-sec/2014/q4/784 http://seclists.org/oss-sec/2014/q4/872 http://secunia.com/advisories/60166 http://www.debian.org/security/2014/dsa-3098 http://www.mandriva.com/security/advisories?name=MDVSA-2014:248 http://www.mandriva.com/security/advisories?name=MDVSA-2015:187 http://www.securityfocus.com/bid/71283 https://exchange.xforce.ibmcloud.com/vulnerabilities/98949 https://github.com/ellson/graphviz/com • CWE-134: Use of Externally-Controlled Format String •

CVSS: 7.8EPSS: 1%CPEs: 1EXPL: 0

Stack-based buffer overflow in the "yyerror" function in Graphviz 2.34.0 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted file. NOTE: This vulnerability exists due to an incomplete fix for CVE-2014-0978. Un desbordamiento de búfer basado en pila en la función "yyerror" de Graphviz 2.34.0 permite que atacantes remotos ejecuten código arbitrario o provoquen una denegación de servicio mediante un archivo manipulado. • http://seclists.org/oss-sec/2014/q1/54 http://www.securityfocus.com/bid/64736 https://bugzilla.redhat.com/show_bug.cgi?id=1050871 https://exchange.xforce.ibmcloud.com/vulnerabilities/90198 https://github.com/ellson/graphviz/commit/d266bb2b4154d11c27252b56d86963aef4434750 https://security.gentoo.org/glsa/201702-06 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.3EPSS: 3%CPEs: 1EXPL: 1

Stack-based buffer overflow in the yyerror function in lib/cgraph/scan.l in Graphviz 2.34.0 allows remote attackers to have unspecified impact via a long line in a dot file. Desbordamientos de pila en la función yyerror de lib/cgraph/scan.l en Graphviz 2.34.0 permite a atacantes remotos tener un impacto no especificado a través de una línea larga en un archivo dot. • http://seclists.org/oss-sec/2014/q1/28 http://seclists.org/oss-sec/2014/q1/38 http://secunia.com/advisories/55666 http://secunia.com/advisories/56244 http://www.debian.org/security/2014/dsa-2843 http://www.mandriva.com/security/advisories?name=MDVSA-2014:024 http://www.securityfocus.com/bid/64674 https://bugs.gentoo.org/show_bug.cgi?id=497274 https://bugzilla.redhat.com/show_bug.cgi?id=1049165 https://exchange.xforce.ibmcloud.com/vulnerabilities/90085 https:// • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 4%CPEs: 1EXPL: 1

Stack-based buffer overflow in the chkNum function in lib/cgraph/scan.l in Graphviz 2.34.0 allows remote attackers to have unspecified impact via vectors related to a "badly formed number" and a "long digit list." Desbordamiento de pila en la función chkNum de lib/cgraph/scan.l en Graphviz 2.34.0 permite a atacantes remotos tener un impacto no especificado a través de vectores relacionados con un "badly formed number" y "long digit list". • http://osvdb.org/101851 http://seclists.org/oss-sec/2014/q1/46 http://seclists.org/oss-sec/2014/q1/51 http://seclists.org/oss-sec/2014/q1/54 http://secunia.com/advisories/55666 http://secunia.com/advisories/56244 http://www.debian.org/security/2014/dsa-2843 http://www.mandriva.com/security/advisories?name=MDVSA-2014:024 http://www.securityfocus.com/bid/64737 https://bugzilla.redhat.com/show_bug.cgi?id=1050872 https://github.com/ellson/graphviz/commit • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •