Buffer Overflow Affecting graphviz package, versions <2.38.0-17+deb9u1
Snyk CVSS
Attack Complexity
Low
User Interaction
Required
Confidentiality
High
Integrity
High
Availability
High
Threat Intelligence
EPSS
0.53% (77th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN9-GRAPHVIZ-1279005
- published 4 May 2021
- disclosed 29 Apr 2021
Introduced: 29 Apr 2021
CVE-2020-18032 Open this link in a new tabHow to fix?
Upgrade Debian:9
graphviz
to version 2.38.0-17+deb9u1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream graphviz
package and not the graphviz
package as distributed by Debian
.
See How to fix?
for Debian:9
relevant fixed versions and status.
Buffer Overflow in Graphviz Graph Visualization Tools from commit ID f8b9e035 and earlier allows remote attackers to execute arbitrary code or cause a denial of service (application crash) by loading a crafted file into the "lib/common/shapes.c" component.
References
- https://security-tracker.debian.org/tracker/CVE-2020-18032
- https://www.debian.org/security/2021/dsa-4914
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5PQPHJHPU46FK3R5XBP3XDT4X37HMPC/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGY2IGARE6RZHTF2UEZEWLMQCDILFK6A/
- https://gitlab.com/graphviz/graphviz/-/issues/1700
- https://lists.debian.org/debian-lts-announce/2021/05/msg00014.html
- https://security.gentoo.org/glsa/202107-04
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D5PQPHJHPU46FK3R5XBP3XDT4X37HMPC/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QGY2IGARE6RZHTF2UEZEWLMQCDILFK6A/