First published: Fri Nov 23 2018(Updated: )
An issue was discovered in cairo.trm in Gnuplot 5.2.5. This issue allows an attacker to conduct a buffer overflow with an arbitrary amount of data in the cairotrm_options function. This flaw is caused by a missing size check of an argument passed to the "set font" function. This issue occurs when the Gnuplot pngcairo terminal is used as a backend.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/gnuplot | <4.6.6-3ubuntu0.1 | 4.6.6-3ubuntu0.1 |
debian/gnuplot | <=5.4.1+dfsg1-1+deb11u1<=5.4.4+dfsg1-2<=6.0.0+dfsg1-3 | |
Gnuplot Gnuplot | =5.2.5 | |
Debian GNU/Linux | =8.0 | |
openSUSE | =15.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-19492 is classified as a medium severity vulnerability due to its potential to allow buffer overflow attacks.
To fix CVE-2018-19492, upgrade to gnuplot version 5.4.1+dfsg1-1+deb11u1 or higher on Debian systems, or ensure you are using gnuplot version 4.6.6-3ubuntu0.1 or lower on Ubuntu systems.
Gnuplot version 5.2.5 is directly affected by CVE-2018-19492, along with several versions on Debian and related systems.
Yes, openSUSE Leap 15.0 is vulnerable to CVE-2018-19492 and requires appropriate updates to mitigate the risk.
CVE-2018-19492 allows an attacker to conduct a buffer overflow attack, which can lead to arbitrary code execution.