Executive Summary

Summary
Title Graphviz vulnerabilities
Informations
Name USN-2083-1 First vendor Publication 2014-01-16
Vendor Ubuntu Last vendor Modification 2014-01-16
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 10 Attack Range Network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 13.10 - Ubuntu 13.04 - Ubuntu 12.10 - Ubuntu 12.04 LTS - Ubuntu 10.04 LTS

Summary:

Graphviz could be made to crash or run programs as your login if it opened a specially crafted file.

Software Description: - graphviz: rich set of graph drawing tools

Details:

It was discovered that Graphviz incorrectly handled memory in the yyerror function. If a user were tricked into opening a specially crafted dot file, an attacker could cause Graphviz to crash, or possibly execute arbitrary code. (CVE-2014-0978, CVE-2014-1235)

It was discovered that Graphviz incorrectly handled memory in the chkNum function. If a user were tricked into opening a specially crafted dot file, an attacker could cause Graphviz to crash, or possibly execute arbitrary code. (CVE-2014-1236)

The default compiler options for affected releases should reduce the vulnerability to a denial of service.

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 13.10:
graphviz 2.26.3-15ubuntu4.1

Ubuntu 13.04:
graphviz 2.26.3-14ubuntu1.1

Ubuntu 12.10:
graphviz 2.26.3-12ubuntu1.1

Ubuntu 12.04 LTS:
graphviz 2.26.3-10ubuntu1.1

Ubuntu 10.04 LTS:
graphviz 2.20.2-8ubuntu3.1

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2083-1
CVE-2014-0978, CVE-2014-1235, CVE-2014-1236

Package Information:
https://launchpad.net/ubuntu/+source/graphviz/2.26.3-15ubuntu4.1
https://launchpad.net/ubuntu/+source/graphviz/2.26.3-14ubuntu1.1
https://launchpad.net/ubuntu/+source/graphviz/2.26.3-12ubuntu1.1
https://launchpad.net/ubuntu/+source/graphviz/2.26.3-10ubuntu1.1
https://launchpad.net/ubuntu/+source/graphviz/2.20.2-8ubuntu3.1

Original Source

Url : http://www.ubuntu.com/usn/USN-2083-1

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:21511
 
Oval ID: oval:org.mitre.oval:def:21511
Title: USN-2083-1 -- graphviz vulnerabilities
Description: Graphviz could be made to crash or run programs as your login if it opened a specially crafted file.
Family: unix Class: patch
Reference(s): USN-2083-1
CVE-2014-0978
CVE-2014-1235
CVE-2014-1236
Version: 5
Platform(s): Ubuntu 13.10
Ubuntu 13.04
Ubuntu 12.10
Ubuntu 12.04
Ubuntu 10.04
Product(s): graphviz
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:22492
 
Oval ID: oval:org.mitre.oval:def:22492
Title: DSA-2843-1 graphviz - buffer overflow
Description: Two buffer overflow vulnerabilities were reported in Graphviz, a rich collection of graph drawing tools.
Family: unix Class: patch
Reference(s): DSA-2843-1
CVE-2014-0978
CVE-2014-1236
Version: 5
Platform(s): Debian GNU/Linux 6.0
Debian GNU/Linux 7
Debian GNU/kFreeBSD 6.0
Debian GNU/kFreeBSD 7
Product(s): graphviz
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1

Nessus® Vulnerability Scanner

Date Description
2017-02-13 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201702-06.nasl - Type : ACT_GATHER_INFO
2014-03-12 Name : The remote Amazon Linux AMI host is missing a security update.
File : ala_ALAS-2014-296.nasl - Type : ACT_GATHER_INFO
2014-03-12 Name : The remote Amazon Linux AMI host is missing a security update.
File : ala_ALAS-2014-297.nasl - Type : ACT_GATHER_INFO
2014-02-12 Name : The remote Fedora host is missing a security update.
File : fedora_2014-0602.nasl - Type : ACT_GATHER_INFO
2014-02-12 Name : The remote Fedora host is missing a security update.
File : fedora_2014-0621.nasl - Type : ACT_GATHER_INFO
2014-02-05 Name : The remote Amazon Linux AMI host is missing a security update.
File : ala_ALAS-2014-284.nasl - Type : ACT_GATHER_INFO
2014-02-05 Name : The remote Amazon Linux AMI host is missing a security update.
File : ala_ALAS-2014-285.nasl - Type : ACT_GATHER_INFO
2014-01-27 Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2014-024.nasl - Type : ACT_GATHER_INFO
2014-01-17 Name : The remote Ubuntu host is missing a security-related patch.
File : ubuntu_USN-2083-1.nasl - Type : ACT_GATHER_INFO
2014-01-14 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2843.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
Date Informations
2017-08-29 09:26:32
  • Multiple Updates
2014-02-17 12:03:00
  • Multiple Updates
2014-01-16 17:18:24
  • First insertion