Joined: 12 May 2004
|Posted: Sun Nov 09, 2008 11:26 pm Post subject: [ GLSA 200811-04 ] Graphviz: User-assisted execution of arbi
|Gentoo Linux Security Advisory
Title: Graphviz: User-assisted execution of arbitrary code (GLSA 200811-04)
Date: November 09, 2008
A buffer overflow in Graphviz might lead to user-assisted execution of arbitrary code via a DOT file.
Graphviz is an open source graph visualization software.
Vulnerable: < 2.20.3
Unaffected: >= 2.20.3
Architectures: All supported architectures
Roee Hay reported a stack-based buffer overflow in the push_subg() function in parser.y when processing a DOT file with a large number of Agraph_t elements.
A remote attacker could entice a user or automated system to open a specially crafted DOT file in an application using Graphviz, possibly leading to the execution of arbitrary code.
There is no known workaround at this time.
All Graphviz users should upgrade to the latest version:
|# emerge --sync
# emerge --ask --oneshot --verbose ">=media-gfx/graphviz-2.20.3"