Stack-based buffer overflow - CVE-2014-0978
Published: January 10, 2014 / Updated: August 3, 2020
Detailed vulnerability description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error within the yyerror function in lib/cgraph/scan.l when processing a long line in a dot file. A remote unauthenticated attacker can trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
How to mitigate CVE-2014-0978
Sources
- http://seclists.org/oss-sec/2014/q1/28
- http://seclists.org/oss-sec/2014/q1/38
- http://secunia.com/advisories/55666
- http://secunia.com/advisories/56244
- http://www.debian.org/security/2014/dsa-2843
- http://www.mandriva.com/security/advisories?name=MDVSA-2014:024
- http://www.securityfocus.com/bid/64674
- https://bugs.gentoo.org/show_bug.cgi?id=497274
- https://bugzilla.redhat.com/show_bug.cgi?id=1049165
- https://exchange.xforce.ibmcloud.com/vulnerabilities/90085
- https://github.com/ellson/graphviz/commit/7aaddf52cd98589fb0c3ab72a393f8411838438a
- https://security.gentoo.org/glsa/201702-06