CVE-2014-0978

Stack-based buffer overflow in the yyerror function in lib/cgraph/scan.l in Graphviz 2.34.0 allows remote attackers to have unspecified impact via a long line in a dot file.
Configurations

Configuration 1 (hide)

cpe:2.3:a:graphviz:graphviz:2.34.0:*:*:*:*:*:*:*

History

21 Nov 2024, 02:03

Type Values Removed Values Added
References () http://seclists.org/oss-sec/2014/q1/28 - () http://seclists.org/oss-sec/2014/q1/28 -
References () http://seclists.org/oss-sec/2014/q1/38 - () http://seclists.org/oss-sec/2014/q1/38 -
References () http://secunia.com/advisories/55666 - Vendor Advisory () http://secunia.com/advisories/55666 - Vendor Advisory
References () http://secunia.com/advisories/56244 - () http://secunia.com/advisories/56244 -
References () http://www.debian.org/security/2014/dsa-2843 - () http://www.debian.org/security/2014/dsa-2843 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2014:024 - () http://www.mandriva.com/security/advisories?name=MDVSA-2014:024 -
References () http://www.securityfocus.com/bid/64674 - () http://www.securityfocus.com/bid/64674 -
References () https://bugs.gentoo.org/show_bug.cgi?id=497274 - () https://bugs.gentoo.org/show_bug.cgi?id=497274 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=1049165 - () https://bugzilla.redhat.com/show_bug.cgi?id=1049165 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/90085 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/90085 -
References () https://github.com/ellson/graphviz/commit/7aaddf52cd98589fb0c3ab72a393f8411838438a - Exploit, Patch () https://github.com/ellson/graphviz/commit/7aaddf52cd98589fb0c3ab72a393f8411838438a - Exploit, Patch
References () https://security.gentoo.org/glsa/201702-06 - () https://security.gentoo.org/glsa/201702-06 -

Information

Published : 2014-01-10 17:55

Updated : 2024-11-21 02:03


NVD link : CVE-2014-0978

Mitre link : CVE-2014-0978

CVE.ORG link : CVE-2014-0978


JSON object : View

Products Affected

graphviz

  • graphviz
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer