blob: 8e308470173a2bed9ed65011891e1af31f6b7342 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200811-04">
<title>Graphviz: User-assisted execution of arbitrary code</title>
A buffer overflow in Graphviz might lead to user-assisted execution of
arbitrary code via a DOT file.
<product type="ebuild">graphviz</product>
<announced>November 09, 2008</announced>
<revised>November 09, 2008: 01</revised>
<package name="media-gfx/graphviz" auto="yes" arch="*">
<unaffected range="ge">2.20.3</unaffected>
<vulnerable range="lt">2.20.3</vulnerable>
Graphviz is an open source graph visualization software.
Roee Hay reported a stack-based buffer overflow in the push_subg()
function in parser.y when processing a DOT file with a large number of
Agraph_t elements.
<impact type="normal">
A remote attacker could entice a user or automated system to open a
specially crafted DOT file in an application using Graphviz, possibly
leading to the execution of arbitrary code.
There is no known workaround at this time.
All Graphviz users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=media-gfx/graphviz-2.20.3&quot;</code>
<uri link="">CVE-2008-4555</uri>
<metadata tag="requester" timestamp="Thu, 16 Oct 2008 18:49:15 +0000">
<metadata tag="submitter" timestamp="Tue, 21 Oct 2008 20:26:38 +0000">
<metadata tag="bugReady" timestamp="Fri, 31 Oct 2008 00:00:32 +0000">