First published: Fri Nov 23 2018(Updated: )
An issue was discovered in datafile.c in Gnuplot 5.2.5. This issue allows an attacker to conduct a heap-based buffer overflow with an arbitrary amount of data in df_generate_ascii_array_entry. To exploit this vulnerability, an attacker must pass an overlong string as the right bound of the range argument that is passed to the plot function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/gnuplot | <4.6.6-3ubuntu0.1 | 4.6.6-3ubuntu0.1 |
debian/gnuplot | <=5.4.1+dfsg1-1+deb11u1<=5.4.4+dfsg1-2<=6.0.0+dfsg1-3 | |
Gnuplot Gnuplot | =5.2.5 | |
Debian GNU/Linux | =8.0 | |
openSUSE | =15.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-19490 is categorized as a critical vulnerability due to its potential to allow heap-based buffer overflow attacks.
To mitigate CVE-2018-19490, users should upgrade to Gnuplot version 4.6.6-3ubuntu0.1 or a later version.
CVE-2018-19490 affects Gnuplot versions up to and including 5.2.5 and certain distributions like Debian and openSUSE.
CVE-2018-19490 can be exploited to conduct arbitrary code execution attacks due to buffer overflow.
Yes, CVE-2018-19490 can be exploited remotely if an attacker manipulates the input string passed to the vulnerable Gnuplot function.