Mandriva Linux Security Advisory : graphviz (MDVSA-2014:024)

critical Nessus Plugin ID 72136

Synopsis

The remote Mandriva Linux host is missing one or more security updates.

Description

Updated graphviz packages fix security vulnerabilities :

Multiple buffer overflow vulnerabilities in graphviz due to an error within the yyerror() function (lib/cgraph/scan.l) which can be exploited to cause a stack-based buffer overflow via a specially crafted file (CVE-2014-0978) and the acceptance of an arbitrarily long digit list by a regular expression matched against user input (CVE-2014-1236).

A build problem was discovered and fixed in swig while building graphviz for Business Server 1, related to the new php-5.5.x version as of the MDVSA-2014:014 advisory. Fixed swig packages is being provided with this advisory as well.

Solution

Update the affected packages.

See Also

https://bugzilla.redhat.com/show_bug.cgi?id=1049165

https://bugzilla.redhat.com/show_bug.cgi?id=1050872

Plugin Details

Severity: Critical

ID: 72136

File Name: mandriva_MDVSA-2014-024.nasl

Version: 1.5

Type: local

Published: 1/27/2014

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:graphviz, p-cpe:/a:mandriva:linux:graphviz-doc, p-cpe:/a:mandriva:linux:java-graphviz, p-cpe:/a:mandriva:linux:lib64cdt5, p-cpe:/a:mandriva:linux:lib64cgraph6, p-cpe:/a:mandriva:linux:lib64graph5, p-cpe:/a:mandriva:linux:lib64graphviz-devel, p-cpe:/a:mandriva:linux:lib64graphviz-static-devel, p-cpe:/a:mandriva:linux:lib64gvc6, p-cpe:/a:mandriva:linux:lib64gvpr2, p-cpe:/a:mandriva:linux:lib64pathplan4, p-cpe:/a:mandriva:linux:lib64xdot4, p-cpe:/a:mandriva:linux:lua-graphviz, p-cpe:/a:mandriva:linux:ocaml-graphviz, p-cpe:/a:mandriva:linux:perl-graphviz, p-cpe:/a:mandriva:linux:php-graphviz, p-cpe:/a:mandriva:linux:python-graphviz, p-cpe:/a:mandriva:linux:ruby-graphviz, p-cpe:/a:mandriva:linux:swig, p-cpe:/a:mandriva:linux:swig-doc, p-cpe:/a:mandriva:linux:tcl-graphviz, cpe:/o:mandriva:business_server:1

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 1/24/2014

Reference Information

CVE: CVE-2014-0978, CVE-2014-1236

BID: 64674, 64737

MDVSA: 2014:024