First published: Tue Jan 07 2014(Updated: )
Graphviz, a collection of tools for the manipulation and layout of graphs, was recently reported to be affected by a buffer overflow vulnerability. The vulnerability is caused due to an error within the "yyerror()" function (lib/cgraph/scan.l) and can be exploited to cause a stack-based buffer overflow via a specially crafted file. References: <a href="https://bugs.gentoo.org/show_bug.cgi?id=497274">https://bugs.gentoo.org/show_bug.cgi?id=497274</a> Commit: <a href="https://github.com/ellson/graphviz/commit/7aaddf52cd98589fb0c3ab72a393f8411838438a">https://github.com/ellson/graphviz/commit/7aaddf52cd98589fb0c3ab72a393f8411838438a</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Graphviz Graphviz | =2.34.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.