Mandriva Linux Security Advisory : graphviz (MDVSA-2014:024)

Critical Nessus Plugin ID 72136


The remote Mandriva Linux host is missing one or more security updates.


Updated graphviz packages fix security vulnerabilities :

Multiple buffer overflow vulnerabilities in graphviz due to an error within the yyerror() function (lib/cgraph/scan.l) which can be exploited to cause a stack-based buffer overflow via a specially crafted file (CVE-2014-0978) and the acceptance of an arbitrarily long digit list by a regular expression matched against user input (CVE-2014-1236).

A build problem was discovered and fixed in swig while building graphviz for Business Server 1, related to the new php-5.5.x version as of the MDVSA-2014:014 advisory. Fixed swig packages is being provided with this advisory as well.


Update the affected packages.

See Also

Plugin Details

Severity: Critical

ID: 72136

File Name: mandriva_MDVSA-2014-024.nasl

Version: 1.4

Type: local

Published: 2014/01/27

Updated: 2019/08/02

Dependencies: 12634

Risk Information

Risk Factor: Critical

CVSS v2.0

Base Score: 10

Temporal Score: 8.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:graphviz, p-cpe:/a:mandriva:linux:graphviz-doc, p-cpe:/a:mandriva:linux:java-graphviz, p-cpe:/a:mandriva:linux:lib64cdt5, p-cpe:/a:mandriva:linux:lib64cgraph6, p-cpe:/a:mandriva:linux:lib64graph5, p-cpe:/a:mandriva:linux:lib64graphviz-devel, p-cpe:/a:mandriva:linux:lib64graphviz-static-devel, p-cpe:/a:mandriva:linux:lib64gvc6, p-cpe:/a:mandriva:linux:lib64gvpr2, p-cpe:/a:mandriva:linux:lib64pathplan4, p-cpe:/a:mandriva:linux:lib64xdot4, p-cpe:/a:mandriva:linux:lua-graphviz, p-cpe:/a:mandriva:linux:ocaml-graphviz, p-cpe:/a:mandriva:linux:perl-graphviz, p-cpe:/a:mandriva:linux:php-graphviz, p-cpe:/a:mandriva:linux:python-graphviz, p-cpe:/a:mandriva:linux:ruby-graphviz, p-cpe:/a:mandriva:linux:swig, p-cpe:/a:mandriva:linux:swig-doc, p-cpe:/a:mandriva:linux:tcl-graphviz, cpe:/o:mandriva:business_server:1

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2014/01/24

Reference Information

CVE: CVE-2014-0978, CVE-2014-1236

BID: 64674, 64737

MDVSA: 2014:024