First published: Thu Jan 09 2014(Updated: )
Graphviz, a collection of tools for the manipulation and layout of graphs, was recently reported to be affected by a buffer overflow vulnerability from user input, which seem to be caused due to the acceptance of arbitrary long digit list by regex. References: <a href="http://seclists.org/oss-sec/2014/q1/46">http://seclists.org/oss-sec/2014/q1/46</a> Commit: <a href="https://github.com/ellson/graphviz/commit/1d1bdec6318746f6f19f245db589eddc887ae8ff">https://github.com/ellson/graphviz/commit/1d1bdec6318746f6f19f245db589eddc887ae8ff</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Graphviz Graphviz | =2.34.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-1236 is classified as a high severity vulnerability due to its potential to cause a buffer overflow from user input.
To fix CVE-2014-1236, upgrade Graphviz to version 2.34.1 or later where the vulnerability has been addressed.
CVE-2014-1236 affects Graphviz version 2.34.0.
CVE-2014-1236 is a buffer overflow vulnerability that arises from improper handling of user input.
Yes, CVE-2014-1236 can potentially be exploited remotely if an attacker sends crafted input to the affected application.