CVE-2014-9157

Format string vulnerability in the yyerror function in lib/cgraph/scan.l in Graphviz allows remote attackers to have unspecified impact via format string specifiers in unknown vectors, which are not properly handled in an error string.
References
Link Resource
http://advisories.mageia.org/MGASA-2014-0520.html Third Party Advisory
http://seclists.org/oss-sec/2014/q4/784 Exploit Mailing List Third Party Advisory
http://seclists.org/oss-sec/2014/q4/872 Exploit Mailing List Third Party Advisory
http://secunia.com/advisories/60166 Broken Link
http://www.debian.org/security/2014/dsa-3098 Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2014:248 Broken Link
http://www.mandriva.com/security/advisories?name=MDVSA-2015:187 Broken Link
http://www.securityfocus.com/bid/71283 Broken Link Third Party Advisory VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/98949 Third Party Advisory VDB Entry
https://github.com/ellson/graphviz/commit/99eda421f7ddc27b14e4ac1d2126e5fe41719081 Exploit Third Party Advisory
http://advisories.mageia.org/MGASA-2014-0520.html Third Party Advisory
http://seclists.org/oss-sec/2014/q4/784 Exploit Mailing List Third Party Advisory
http://seclists.org/oss-sec/2014/q4/872 Exploit Mailing List Third Party Advisory
http://secunia.com/advisories/60166 Broken Link
http://www.debian.org/security/2014/dsa-3098 Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2014:248 Broken Link
http://www.mandriva.com/security/advisories?name=MDVSA-2015:187 Broken Link
http://www.securityfocus.com/bid/71283 Broken Link Third Party Advisory VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/98949 Third Party Advisory VDB Entry
https://github.com/ellson/graphviz/commit/99eda421f7ddc27b14e4ac1d2126e5fe41719081 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:graphviz:graphviz:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:20

Type Values Removed Values Added
References () http://advisories.mageia.org/MGASA-2014-0520.html - Third Party Advisory () http://advisories.mageia.org/MGASA-2014-0520.html - Third Party Advisory
References () http://seclists.org/oss-sec/2014/q4/784 - Exploit, Mailing List, Third Party Advisory () http://seclists.org/oss-sec/2014/q4/784 - Exploit, Mailing List, Third Party Advisory
References () http://seclists.org/oss-sec/2014/q4/872 - Exploit, Mailing List, Third Party Advisory () http://seclists.org/oss-sec/2014/q4/872 - Exploit, Mailing List, Third Party Advisory
References () http://secunia.com/advisories/60166 - Broken Link () http://secunia.com/advisories/60166 - Broken Link
References () http://www.debian.org/security/2014/dsa-3098 - Third Party Advisory () http://www.debian.org/security/2014/dsa-3098 - Third Party Advisory
References () http://www.mandriva.com/security/advisories?name=MDVSA-2014:248 - Broken Link () http://www.mandriva.com/security/advisories?name=MDVSA-2014:248 - Broken Link
References () http://www.mandriva.com/security/advisories?name=MDVSA-2015:187 - Broken Link () http://www.mandriva.com/security/advisories?name=MDVSA-2015:187 - Broken Link
References () http://www.securityfocus.com/bid/71283 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/71283 - Broken Link, Third Party Advisory, VDB Entry
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/98949 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/98949 - Third Party Advisory, VDB Entry
References () https://github.com/ellson/graphviz/commit/99eda421f7ddc27b14e4ac1d2126e5fe41719081 - Exploit, Third Party Advisory () https://github.com/ellson/graphviz/commit/99eda421f7ddc27b14e4ac1d2126e5fe41719081 - Exploit, Third Party Advisory

19 Jul 2024, 13:02

Type Values Removed Values Added
CPE cpe:2.3:a:graphviz:graphviz:-:*:*:*:*:*:*:* cpe:2.3:a:graphviz:graphviz:*:*:*:*:*:*:*:*
References () http://advisories.mageia.org/MGASA-2014-0520.html - () http://advisories.mageia.org/MGASA-2014-0520.html - Third Party Advisory
References () http://seclists.org/oss-sec/2014/q4/784 - Exploit () http://seclists.org/oss-sec/2014/q4/784 - Exploit, Mailing List, Third Party Advisory
References () http://seclists.org/oss-sec/2014/q4/872 - Exploit () http://seclists.org/oss-sec/2014/q4/872 - Exploit, Mailing List, Third Party Advisory
References () http://secunia.com/advisories/60166 - () http://secunia.com/advisories/60166 - Broken Link
References () http://www.debian.org/security/2014/dsa-3098 - () http://www.debian.org/security/2014/dsa-3098 - Third Party Advisory
References () http://www.mandriva.com/security/advisories?name=MDVSA-2014:248 - () http://www.mandriva.com/security/advisories?name=MDVSA-2014:248 - Broken Link
References () http://www.mandriva.com/security/advisories?name=MDVSA-2015:187 - () http://www.mandriva.com/security/advisories?name=MDVSA-2015:187 - Broken Link
References () http://www.securityfocus.com/bid/71283 - () http://www.securityfocus.com/bid/71283 - Broken Link, Third Party Advisory, VDB Entry
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/98949 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/98949 - Third Party Advisory, VDB Entry
References () https://github.com/ellson/graphviz/commit/99eda421f7ddc27b14e4ac1d2126e5fe41719081 - Exploit () https://github.com/ellson/graphviz/commit/99eda421f7ddc27b14e4ac1d2126e5fe41719081 - Exploit, Third Party Advisory

Information

Published : 2014-12-03 21:59

Updated : 2024-11-21 02:20


NVD link : CVE-2014-9157

Mitre link : CVE-2014-9157

CVE.ORG link : CVE-2014-9157


JSON object : View

Products Affected

debian

  • debian_linux

graphviz

  • graphviz
CWE
CWE-134

Use of Externally-Controlled Format String