CVE-2018-19492
Ubuntu Security Notice USN-4541-1
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
An issue was discovered in cairo.trm in Gnuplot 5.2.5. This issue allows an attacker to conduct a buffer overflow with an arbitrary amount of data in the cairotrm_options function. This flaw is caused by a missing size check of an argument passed to the "set font" function. This issue occurs when the Gnuplot pngcairo terminal is used as a backend.
Se ha descubierto un problema en cairo.trm en Gnuplot 5.2.5. Este problema permite a un atacante realizar un desbordamiento de búfer con una cantidad arbitraria de datos en la función ccairotrm_options. Este fallo se debe a la falta de una comprobación de tamaño de un argumento pasado a la función "set font". Esto ocurre cuando el terminal pngcairo de Gnuplot se utiliza como un backend.
Tim Blazytko, Cornelius Aschermann, Sergej Schumilo and Nils Bars discovered that Gnuplot did not properly validate string sizes in the df_generate_ascii_array_entry function. An attacker could possibly use this issue to cause a heap buffer overflow, resulting in a denial of service attack or arbitrary code execution. Tim Blazytko, Cornelius Aschermann, Sergej Schumilo and Nils Bars discovered that Gnuplot did not properly validate string sizes in the PS_options function when the Gnuplot postscript terminal is used as a backend. An attacker could possibly use this issue to cause a buffer overflow, resulting in a denial of service attack or arbitrary code execution. Various other issues were also addressed.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2018-11-23 CVE Reserved
- 2018-11-23 CVE Published
- 2024-08-05 CVE Updated
- 2024-08-05 First Exploit
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (6)
URL | Tag | Source |
---|---|---|
https://lists.debian.org/debian-lts-announce/2018/11/msg00031.html | Mailing List |
|
https://lists.debian.org/debian-lts-announce/2018/11/msg00035.html | Mailing List |
|
URL | Date | SRC |
---|---|---|
https://sourceforge.net/p/gnuplot/bugs/2089 | 2024-08-05 |
URL | Date | SRC |
---|---|---|
https://sourceforge.net/p/gnuplot/gnuplot-main/ci/d5020716834582b20a5e12cdd49f39ee4f9dd949 | 2020-09-28 |
URL | Date | SRC |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00066.html | 2020-09-28 | |
https://usn.ubuntu.com/4541-1 | 2020-09-28 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Gnuplot Search vendor "Gnuplot" | Gnuplot Search vendor "Gnuplot" for product "Gnuplot" | 5.2.5 Search vendor "Gnuplot" for product "Gnuplot" and version "5.2.5" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 8.0 Search vendor "Debian" for product "Debian Linux" and version "8.0" | - |
Affected
| ||||||
Opensuse Search vendor "Opensuse" | Leap Search vendor "Opensuse" for product "Leap" | 15.0 Search vendor "Opensuse" for product "Leap" and version "15.0" | - |
Affected
|