Описание
Stack-based buffer overflow in the chkNum function in lib/cgraph/scan.l in Graphviz 2.34.0 allows remote attackers to have unspecified impact via vectors related to a "badly formed number" and a "long digit list."
Stack-based buffer overflow in the chkNum function in lib/cgraph/scan.l in Graphviz 2.34.0 allows remote attackers to have unspecified impact via vectors related to a "badly formed number" and a "long digit list."
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2014-1236
- https://github.com/ellson/graphviz/commit/1d1bdec6318746f6f19f245db589eddc887ae8ff
- https://bugzilla.redhat.com/show_bug.cgi?id=1050872
- https://security.gentoo.org/glsa/201702-06
- http://osvdb.org/101851
- http://seclists.org/oss-sec/2014/q1/46
- http://seclists.org/oss-sec/2014/q1/51
- http://seclists.org/oss-sec/2014/q1/54
- http://secunia.com/advisories/55666
- http://secunia.com/advisories/56244
- http://www.debian.org/security/2014/dsa-2843
- http://www.mandriva.com/security/advisories?name=MDVSA-2014:024
- http://www.securityfocus.com/bid/64737
Связанные уязвимости
Stack-based buffer overflow in the chkNum function in lib/cgraph/scan.l in Graphviz 2.34.0 allows remote attackers to have unspecified impact via vectors related to a "badly formed number" and a "long digit list."
Stack-based buffer overflow in the chkNum function in lib/cgraph/scan.l in Graphviz 2.34.0 allows remote attackers to have unspecified impact via vectors related to a "badly formed number" and a "long digit list."
Stack-based buffer overflow in the chkNum function in lib/cgraph/scan.l in Graphviz 2.34.0 allows remote attackers to have unspecified impact via vectors related to a "badly formed number" and a "long digit list."
Stack-based buffer overflow in the chkNum function in lib/cgraph/scan. ...