First published: Tue Jan 07 2014(Updated: )
Graphviz, a collection of tools for the manipulation and layout of graphs, was recently reported to be affected by a buffer overflow vulnerability. The vulnerability is caused due to an error within the "yyerror()" function (lib/cgraph/scan.l) and can be exploited to cause a stack-based buffer overflow via a specially crafted file. References: <a href="https://bugs.gentoo.org/show_bug.cgi?id=497274">https://bugs.gentoo.org/show_bug.cgi?id=497274</a> Commit: <a href="https://github.com/ellson/graphviz/commit/7aaddf52cd98589fb0c3ab72a393f8411838438a">https://github.com/ellson/graphviz/commit/7aaddf52cd98589fb0c3ab72a393f8411838438a</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Graphviz |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1049165 is high due to the potential for a stack-based buffer overflow, which can lead to arbitrary code execution.
To address REDHAT-BUG-1049165, you should update to the latest patched version of Graphviz.
REDHAT-BUG-1049165 affects all versions of Graphviz that are vulnerable to the buffer overflow.
Yes, REDHAT-BUG-1049165 can potentially be exploited remotely if the vulnerable software is running in an environment that can be accessed over a network.
REDHAT-BUG-1049165 specifically affects the "yyerror()" function in the lib/cgraph/scan.l file.