10 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
0.034 Low
EPSS
Percentile
91.4%
Issue Overview:
Stack-based buffer overflow in the chkNum function in lib/cgraph/scan.l in Graphviz 2.34.0 allows remote attackers to have unspecified impact via vectors related to a “badly formed number” and a “long digit list.”
Stack-based buffer overflow in the yyerror function in lib/cgraph/scan.l in Graphviz 2.34.0 allows remote attackers to have unspecified impact via a long line in a dot file.
Graphviz was recently reported to be affected by a buffer overflow vulnerability, which seem to have introduced in the fix for CVE-2014-0978.
Affected Packages:
graphviz
Issue Correction:
Run yum update graphviz to update your system.
New Packages:
i686:
graphviz-lua-2.30.1-12.39.amzn1.i686
graphviz-java-2.30.1-12.39.amzn1.i686
graphviz-python-2.30.1-12.39.amzn1.i686
graphviz-ruby-2.30.1-12.39.amzn1.i686
graphviz-guile-2.30.1-12.39.amzn1.i686
graphviz-php54-2.30.1-12.39.amzn1.i686
graphviz-tcl-2.30.1-12.39.amzn1.i686
graphviz-gd-2.30.1-12.39.amzn1.i686
graphviz-doc-2.30.1-12.39.amzn1.i686
graphviz-graphs-2.30.1-12.39.amzn1.i686
graphviz-devel-2.30.1-12.39.amzn1.i686
graphviz-2.30.1-12.39.amzn1.i686
graphviz-debuginfo-2.30.1-12.39.amzn1.i686
graphviz-perl-2.30.1-12.39.amzn1.i686
graphviz-R-2.30.1-12.39.amzn1.i686
src:
graphviz-2.30.1-12.39.amzn1.src
x86_64:
graphviz-guile-2.30.1-12.39.amzn1.x86_64
graphviz-gd-2.30.1-12.39.amzn1.x86_64
graphviz-doc-2.30.1-12.39.amzn1.x86_64
graphviz-R-2.30.1-12.39.amzn1.x86_64
graphviz-ruby-2.30.1-12.39.amzn1.x86_64
graphviz-lua-2.30.1-12.39.amzn1.x86_64
graphviz-tcl-2.30.1-12.39.amzn1.x86_64
graphviz-2.30.1-12.39.amzn1.x86_64
graphviz-java-2.30.1-12.39.amzn1.x86_64
graphviz-debuginfo-2.30.1-12.39.amzn1.x86_64
graphviz-perl-2.30.1-12.39.amzn1.x86_64
graphviz-graphs-2.30.1-12.39.amzn1.x86_64
graphviz-devel-2.30.1-12.39.amzn1.x86_64
graphviz-python-2.30.1-12.39.amzn1.x86_64
graphviz-php54-2.30.1-12.39.amzn1.x86_64
Red Hat: CVE-2014-0978, CVE-2014-1235, CVE-2014-1236
Mitre: CVE-2014-0978, CVE-2014-1235, CVE-2014-1236
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Amazon Linux | 1 | i686 | graphviz-lua | < 2.30.1-12.39.amzn1 | graphviz-lua-2.30.1-12.39.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | graphviz-java | < 2.30.1-12.39.amzn1 | graphviz-java-2.30.1-12.39.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | graphviz-python | < 2.30.1-12.39.amzn1 | graphviz-python-2.30.1-12.39.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | graphviz-ruby | < 2.30.1-12.39.amzn1 | graphviz-ruby-2.30.1-12.39.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | graphviz-guile | < 2.30.1-12.39.amzn1 | graphviz-guile-2.30.1-12.39.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | graphviz-php54 | < 2.30.1-12.39.amzn1 | graphviz-php54-2.30.1-12.39.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | graphviz-tcl | < 2.30.1-12.39.amzn1 | graphviz-tcl-2.30.1-12.39.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | graphviz-gd | < 2.30.1-12.39.amzn1 | graphviz-gd-2.30.1-12.39.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | graphviz-doc | < 2.30.1-12.39.amzn1 | graphviz-doc-2.30.1-12.39.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | graphviz-graphs | < 2.30.1-12.39.amzn1 | graphviz-graphs-2.30.1-12.39.amzn1.i686.rpm |
10 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
0.034 Low
EPSS
Percentile
91.4%