Stack-based buffer overflow - CVE-2014-1236
Published: January 10, 2014 / Updated: August 3, 2020
Detailed vulnerability description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error within the chkNum function in lib/cgraph/scan.l when processing vectors related to a "badly formed number" and a "long digit list. A remote unauthenticated attacker can trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
How to mitigate CVE-2014-1236
Sources
- http://osvdb.org/101851
- http://seclists.org/oss-sec/2014/q1/46
- http://seclists.org/oss-sec/2014/q1/51
- http://seclists.org/oss-sec/2014/q1/54
- http://secunia.com/advisories/55666
- http://secunia.com/advisories/56244
- http://www.debian.org/security/2014/dsa-2843
- http://www.mandriva.com/security/advisories?name=MDVSA-2014:024
- http://www.securityfocus.com/bid/64737
- https://bugzilla.redhat.com/show_bug.cgi?id=1050872
- https://github.com/ellson/graphviz/commit/1d1bdec6318746f6f19f245db589eddc887ae8ff
- https://security.gentoo.org/glsa/201702-06