First published: Thu Jan 09 2014(Updated: )
Graphviz, a collection of tools for the manipulation and layout of graphs, was recently reported to be affected by a buffer overflow vulnerability from user input, which seem to be caused due to the acceptance of arbitrary long digit list by regex. References: <a href="http://seclists.org/oss-sec/2014/q1/46">http://seclists.org/oss-sec/2014/q1/46</a> Commit: <a href="https://github.com/ellson/graphviz/commit/1d1bdec6318746f6f19f245db589eddc887ae8ff">https://github.com/ellson/graphviz/commit/1d1bdec6318746f6f19f245db589eddc887ae8ff</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Graphviz |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1050872 is classified as critical due to the potential for remote code execution from the buffer overflow.
To fix REDHAT-BUG-1050872, update Graphviz to the latest version provided by the vendor that addresses this vulnerability.
REDHAT-BUG-1050872 is caused by a buffer overflow resulting from the acceptance of arbitrarily long digit lists through regular expressions.
All versions of Graphviz before the patch addressing REDHAT-BUG-1050872 are affected by this vulnerability.
Yes, there are known exploits associated with REDHAT-BUG-1050872 that could allow an attacker to execute arbitrary code.