First published: Thu Apr 29 2021(Updated: )
Buffer Overflow in Graphviz Graph Visualization Tools from commit ID f8b9e035 and earlier allows remote attackers to execute arbitrary code or cause a denial of service (application crash) by loading a crafted file into the "lib/common/shapes.c" component.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/graphviz | 2.40.1-6+deb10u1 2.42.2-5 2.42.2-7 | |
Graphviz Graphviz | <2.46.0 | |
Debian GNU/Linux | =9.0 | |
Debian GNU/Linux | =10.0 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-18032 is classified as a high severity vulnerability due to its potential for remote code execution and application crashes.
To resolve CVE-2020-18032, you should upgrade to Graphviz versions 2.40.1-6+deb10u1, 2.42.2-5, or later than 2.46.0.
CVE-2020-18032 affects multiple versions of Graphviz, specifically those prior to 2.46.0 as well as Debian 9 and 10.
CVE-2020-18032 can enable attackers to execute arbitrary code or cause denial of service by exploiting a buffer overflow.
The vulnerability CVE-2020-18032 specifically targets the 'lib/common/shapes.c' component of Graphviz.