First published: Fri Sep 25 2020(Updated: )
Tim Blazytko, Cornelius Aschermann, Sergej Schumilo and Nils Bars discovered that Gnuplot did not properly validate string sizes in the df_generate_ascii_array_entry function. An attacker could possibly use this issue to cause a heap buffer overflow, resulting in a denial of service attack or arbitrary code execution. (CVE-2018-19490) Tim Blazytko, Cornelius Aschermann, Sergej Schumilo and Nils Bars discovered that Gnuplot did not properly validate string sizes in the PS_options function when the Gnuplot postscript terminal is used as a backend. An attacker could possibly use this issue to cause a buffer overflow, resulting in a denial of service attack or arbitrary code execution. (CVE-2018-19491) Tim Blazytko, Cornelius Aschermann, Sergej Schumilo and Nils Bars discovered that Gnuplot did not properly validate string sizes in the cairotrm_options function when the Gnuplot postscript terminal is used as a backend. An attacker could possibly use this issue to cause a buffer overflow, resulting in a denial of service attack or arbitrary code execution. (CVE-2018-19492)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/gnuplot | <4.6.6-3ubuntu0.1 | 4.6.6-3ubuntu0.1 |
Ubuntu Linux | =16.04 | |
All of | ||
ubuntu/gnuplot-data | <4.6.6-3ubuntu0.1 | 4.6.6-3ubuntu0.1 |
Ubuntu Linux | =16.04 | |
All of | ||
ubuntu/gnuplot-nox | <4.6.6-3ubuntu0.1 | 4.6.6-3ubuntu0.1 |
Ubuntu Linux | =16.04 | |
All of | ||
ubuntu/gnuplot-qt | <4.6.6-3ubuntu0.1 | 4.6.6-3ubuntu0.1 |
Ubuntu Linux | =16.04 | |
All of | ||
ubuntu/gnuplot-tex | <4.6.6-3ubuntu0.1 | 4.6.6-3ubuntu0.1 |
Ubuntu Linux | =16.04 | |
All of | ||
ubuntu/gnuplot-x11 | <4.6.6-3ubuntu0.1 | 4.6.6-3ubuntu0.1 |
Ubuntu Linux | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of USN-4541-1 is categorized as high due to the potential for a heap buffer overflow that could lead to a denial of service.
To fix USN-4541-1, upgrade the affected packages to version 4.6.6-3ubuntu0.1 on Ubuntu 16.04.
USN-4541-1 affects all versions of Gnuplot below 4.6.6-3ubuntu0.1 on Ubuntu 16.04.
The cause of the vulnerability in USN-4541-1 is improper validation of string sizes in the df_generate_ascii_array_entry function.
The products impacted by USN-4541-1 include gnuplot, gnuplot-data, gnuplot-nox, gnuplot-qt, gnuplot-tex, and gnuplot-x11 on Ubuntu 16.04.