Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-19491

Опубликовано: 23 нояб. 2018
Источник: debian
EPSS Низкий

Описание

An issue was discovered in post.trm in Gnuplot 5.2.5. This issue allows an attacker to conduct a buffer overflow with an arbitrary amount of data in the PS_options function. This flaw is caused by a missing size check of an argument passed to the "set font" function. This issue occurs when the Gnuplot postscript terminal is used as a backend.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
gnuplotfixed5.4.0+dfsg1-1package
gnuplot5removedpackage

Примечания

  • https://sourceforge.net/p/gnuplot/bugs/2094/

  • https://sourceforge.net/p/gnuplot/gnuplot-main/ci/d5020716834582b20a5e12cdd49f39ee4f9dd949/ (5.4.rc1)

  • No security impact, gnuplot can execute arbitrary commands and need to come from a trusted source,

  • see README.Debian.security (added in 5.2.6)

EPSS

Процентиль: 38%
0.00165
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 7 лет назад

An issue was discovered in post.trm in Gnuplot 5.2.5. This issue allows an attacker to conduct a buffer overflow with an arbitrary amount of data in the PS_options function. This flaw is caused by a missing size check of an argument passed to the "set font" function. This issue occurs when the Gnuplot postscript terminal is used as a backend.

CVSS3: 3.3
redhat
около 7 лет назад

An issue was discovered in post.trm in Gnuplot 5.2.5. This issue allows an attacker to conduct a buffer overflow with an arbitrary amount of data in the PS_options function. This flaw is caused by a missing size check of an argument passed to the "set font" function. This issue occurs when the Gnuplot postscript terminal is used as a backend.

CVSS3: 7.8
nvd
около 7 лет назад

An issue was discovered in post.trm in Gnuplot 5.2.5. This issue allows an attacker to conduct a buffer overflow with an arbitrary amount of data in the PS_options function. This flaw is caused by a missing size check of an argument passed to the "set font" function. This issue occurs when the Gnuplot postscript terminal is used as a backend.

CVSS3: 7.8
github
больше 3 лет назад

An issue was discovered in post.trm in Gnuplot 5.2.5. This issue allows an attacker to conduct a buffer overflow with an arbitrary amount of data in the PS_options function. This flaw is caused by a missing size check of an argument passed to the "set font" function. This issue occurs when the Gnuplot postscript terminal is used as a backend.

suse-cvrf
почти 7 лет назад

Security update for gnuplot

EPSS

Процентиль: 38%
0.00165
Низкий