Medium: graphviz-php

2014-09-16T22:36:00
ID ALAS-2014-297
Type amazon
Reporter Amazon
Modified 2014-09-16T22:36:00

Description

Issue Overview:

Stack-based buffer overflow in the chkNum function in lib/cgraph/scan.l in Graphviz 2.34.0 allows remote attackers to have unspecified impact via vectors related to a "badly formed number" and a "long digit list."

Stack-based buffer overflow in the yyerror function in lib/cgraph/scan.l in Graphviz 2.34.0 allows remote attackers to have unspecified impact via a long line in a dot file.

Graphviz was recently reported to be affected by a buffer overflow vulnerability, which seem to have introduced in the fix for CVE-2014-0978 __.

Affected Packages:

graphviz-php

Issue Correction:
Run yum update graphviz-php to update your system.

New Packages:

i686:  
    graphviz-php-2.30.1-12.37.amzn1.i686

src:  
    graphviz-php-2.30.1-12.37.amzn1.src

x86_64:  
    graphviz-php-2.30.1-12.37.amzn1.x86_64