First published: Thu Jan 09 2014(Updated: )
Graphviz, a collection of tools for the manipulation and layout of graphs, was recently reported to be affected by a buffer overflow vulnerability, which seem to have introduced in the fix for <a href="https://access.redhat.com/security/cve/CVE-2014-0978">CVE-2014-0978</a>. References: <a href="http://seclists.org/oss-sec/2014/q1/46">http://seclists.org/oss-sec/2014/q1/46</a> Commit: <a href="https://github.com/ellson/graphviz/commit/d266bb2b4154d11c27252b56d86963aef4434750">https://github.com/ellson/graphviz/commit/d266bb2b4154d11c27252b56d86963aef4434750</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Graphviz Graphviz | =2.34.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-1235 is classified as a high-severity buffer overflow vulnerability affecting Graphviz.
To mitigate CVE-2014-1235, upgrade Graphviz to version 2.34.1 or later.
Graphviz version 2.34.0 is specifically affected by CVE-2014-1235.
CVE-2014-1235 is a buffer overflow vulnerability that can lead to execution of arbitrary code.
There are no known effective workarounds for CVE-2014-1235 other than applying the available security updates.