An issue was discovered in datafile.c in Gnuplot 5.2.5. This issue allows an attacker to conduct a heap-based buffer overflow with an arbitrary amount of data in df_generate_ascii_array_entry. To exploit this vulnerability, an attacker must pass an overlong string as the right bound of the range argument that is passed to the plot function.
References
Configurations
History
21 Nov 2024, 03:58
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00066.html - Mailing List, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2018/11/msg00031.html - Mailing List, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2018/11/msg00035.html - Mailing List, Third Party Advisory | |
References | () https://sourceforge.net/p/gnuplot/bugs/2093/ - Exploit, Third Party Advisory | |
References | () https://sourceforge.net/p/gnuplot/gnuplot-main/ci/d5020716834582b20a5e12cdd49f39ee4f9dd949/ - Patch, Third Party Advisory | |
References | () https://usn.ubuntu.com/4541-1/ - |
Information
Published : 2018-11-23 17:29
Updated : 2024-11-21 03:58
NVD link : CVE-2018-19490
Mitre link : CVE-2018-19490
CVE.ORG link : CVE-2018-19490
JSON object : View
Products Affected
debian
- debian_linux
gnuplot
- gnuplot
opensuse
- leap
CWE
CWE-787
Out-of-bounds Write