Debian DSA-2843-1 : graphviz - buffer overflow

Critical Nessus Plugin ID 71934

Synopsis

The remote Debian host is missing a security-related update.

Description

Two buffer overflow vulnerabilities were reported in Graphviz, a rich collection of graph drawing tools. The Common Vulnerabilities and Exposures project identifies the following issues :

- CVE-2014-0978 It was discovered that user-supplied input used in the yyerror() function in lib/cgraph/scan.l is not bound-checked before beeing copied into an insufficiently sized memory buffer. A context-dependent attacker could supply a specially crafted input file containing a long line to cause a stack-based buffer overlow, resulting in a denial of service (application crash) or potentially allowing the execution of arbitrary code.

- CVE-2014-1236 Sebastian Krahmer reported an overflow condition in the chkNum() function in lib/cgraph/scan.l that is triggered as the used regular expression accepts an arbitrary long digit list. With a specially crafted input file, a context-dependent attacker can cause a stack-based buffer overflow, resulting in a denial of service (application crash) or potentially allowing the execution of arbitrary code.

Solution

Upgrade the graphviz packages.

For the oldstable distribution (squeeze), these problems have been fixed in version 2.26.3-5+squeeze2.

For the stable distribution (wheezy), these problems have been fixed in version 2.26.3-14+deb7u1.

See Also

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=734745

https://security-tracker.debian.org/tracker/CVE-2014-0978

https://security-tracker.debian.org/tracker/CVE-2014-1236

https://packages.debian.org/source/squeeze/graphviz

https://packages.debian.org/source/wheezy/graphviz

https://www.debian.org/security/2014/dsa-2843

Plugin Details

Severity: Critical

ID: 71934

File Name: debian_DSA-2843.nasl

Version: 1.8

Type: local

Agent: unix

Published: 2014/01/14

Updated: 2018/11/10

Dependencies: 12634

Risk Information

Risk Factor: Critical

CVSS v2.0

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:graphviz, cpe:/o:debian:debian_linux:6.0, cpe:/o:debian:debian_linux:7.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2014/01/13

Reference Information

CVE: CVE-2014-0978, CVE-2014-1236

BID: 64674, 64737

DSA: 2843