[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247621

 
 

909

 
 

194512

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2014-297 ---- graphviz-php

ID: oval:org.secpod.oval:def:1600125Date: (C)2016-01-05   (M)2022-10-10
Class: PATCHFamily: unix




Stack-based buffer overflow in the chkNum function in lib/cgraph/scan.l in Graphviz 2.34.0 allows remote attackers to have unspecified impact via vectors related to a "badly formed number" and a "long digit list." Stack-based buffer overflow in the yyerror function in lib/cgraph/scan.l in Graphviz 2.34.0 allows remote attackers to have unspecified impact via a long line in a dot file. Graphviz was recently reported to be affected by a buffer overflow vulnerability, which seem to have introduced in the fix for CVE-2014-0978 .

Platform:
Amazon Linux AMI
Product:
graphviz-php
Reference:
ALAS-2014-297
CVE-2014-1235
CVE-2014-1236
CVE-2014-0978
CVE    3
CVE-2014-0978
CVE-2014-1236
CVE-2014-1235
CPE    2
cpe:/o:amazon:linux
cpe:/a:php:graphviz-php

© SecPod Technologies