Описание
Stack-based buffer overflow in the chkNum function in lib/cgraph/scan.l in Graphviz 2.34.0 allows remote attackers to have unspecified impact via vectors related to a "badly formed number" and a "long digit list."
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 2.36.0-0ubuntu1 |
| lucid | released | 2.20.2-8ubuntu3.1 |
| precise | released | 2.26.3-10ubuntu1.1 |
| quantal | released | 2.26.3-12ubuntu1.1 |
| raring | released | 2.26.3-14ubuntu1.1 |
| saucy | released | 2.26.3-15ubuntu4.1 |
| upstream | needs-triage |
Показывать по
EPSS
10 Critical
CVSS2
Связанные уязвимости
Stack-based buffer overflow in the chkNum function in lib/cgraph/scan.l in Graphviz 2.34.0 allows remote attackers to have unspecified impact via vectors related to a "badly formed number" and a "long digit list."
Stack-based buffer overflow in the chkNum function in lib/cgraph/scan.l in Graphviz 2.34.0 allows remote attackers to have unspecified impact via vectors related to a "badly formed number" and a "long digit list."
Stack-based buffer overflow in the chkNum function in lib/cgraph/scan. ...
Stack-based buffer overflow in the chkNum function in lib/cgraph/scan.l in Graphviz 2.34.0 allows remote attackers to have unspecified impact via vectors related to a "badly formed number" and a "long digit list."
EPSS
10 Critical
CVSS2