GLSA-200811-04 : Graphviz: User-assisted execution of arbitrary code
High Nessus Plugin ID 34735
SynopsisThe remote Gentoo host is missing one or more security-related patches.
DescriptionThe remote host is affected by the vulnerability described in GLSA-200811-04 (Graphviz: User-assisted execution of arbitrary code)
Roee Hay reported a stack-based buffer overflow in the push_subg() function in parser.y when processing a DOT file with a large number of Agraph_t elements.
A remote attacker could entice a user or automated system to open a specially crafted DOT file in an application using Graphviz, possibly leading to the execution of arbitrary code.
There is no known workaround at this time.
SolutionAll Graphviz users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=media-gfx/graphviz-2.20.3'