Stack-based buffer overflow in the chkNum function in lib/cgraph/scan.l in Graphviz 2.34.0 allows remote attackers to have unspecified impact via vectors related to a "badly formed number" and a "long digit list."
Version | Base score | Base severity | Vector |
---|
Hyperlink | Resource Type |
---|
Stack-based buffer overflow in the chkNum function in lib/cgraph/scan.l in Graphviz 2.34.0 allows remote attackers to have unspecified impact via vectors related to a "badly formed number" and a "long digit list."
Type | CWE ID | Description |
---|---|---|
text | N/A | n/a |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://seclists.org/oss-sec/2014/q1/51 | mailing-list x_refsource_MLIST |
http://osvdb.org/101851 | vdb-entry x_refsource_OSVDB |
http://www.mandriva.com/security/advisories?name=MDVSA-2014:024 | vendor-advisory x_refsource_MANDRIVA |
https://security.gentoo.org/glsa/201702-06 | vendor-advisory x_refsource_GENTOO |
http://seclists.org/oss-sec/2014/q1/54 | mailing-list x_refsource_MLIST |
https://github.com/ellson/graphviz/commit/1d1bdec6318746f6f19f245db589eddc887ae8ff | x_refsource_CONFIRM |
http://www.debian.org/security/2014/dsa-2843 | vendor-advisory x_refsource_DEBIAN |
http://seclists.org/oss-sec/2014/q1/46 | mailing-list x_refsource_MLIST |
https://bugzilla.redhat.com/show_bug.cgi?id=1050872 | x_refsource_CONFIRM |
http://www.securityfocus.com/bid/64737 | vdb-entry x_refsource_BID |
http://secunia.com/advisories/55666 | third-party-advisory x_refsource_SECUNIA |
http://secunia.com/advisories/56244 | third-party-advisory x_refsource_SECUNIA |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://seclists.org/oss-sec/2014/q1/51 | mailing-list x_refsource_MLIST x_transferred |
http://osvdb.org/101851 | vdb-entry x_refsource_OSVDB x_transferred |
http://www.mandriva.com/security/advisories?name=MDVSA-2014:024 | vendor-advisory x_refsource_MANDRIVA x_transferred |
https://security.gentoo.org/glsa/201702-06 | vendor-advisory x_refsource_GENTOO x_transferred |
http://seclists.org/oss-sec/2014/q1/54 | mailing-list x_refsource_MLIST x_transferred |
https://github.com/ellson/graphviz/commit/1d1bdec6318746f6f19f245db589eddc887ae8ff | x_refsource_CONFIRM x_transferred |
http://www.debian.org/security/2014/dsa-2843 | vendor-advisory x_refsource_DEBIAN x_transferred |
http://seclists.org/oss-sec/2014/q1/46 | mailing-list x_refsource_MLIST x_transferred |
https://bugzilla.redhat.com/show_bug.cgi?id=1050872 | x_refsource_CONFIRM x_transferred |
http://www.securityfocus.com/bid/64737 | vdb-entry x_refsource_BID x_transferred |
http://secunia.com/advisories/55666 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://secunia.com/advisories/56244 | third-party-advisory x_refsource_SECUNIA x_transferred |
Stack-based buffer overflow in the chkNum function in lib/cgraph/scan.l in Graphviz 2.34.0 allows remote attackers to have unspecified impact via vectors related to a "badly formed number" and a "long digit list."
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Primary | 2.0 | 10.0 | HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |