Debian DSA-2843-1 : graphviz - buffer overflow

critical Nessus Plugin ID 71934

Synopsis

The remote Debian host is missing a security-related update.

Description

Two buffer overflow vulnerabilities were reported in Graphviz, a rich collection of graph drawing tools. The Common Vulnerabilities and Exposures project identifies the following issues :

- CVE-2014-0978 It was discovered that user-supplied input used in the yyerror() function in lib/cgraph/scan.l is not bound-checked before beeing copied into an insufficiently sized memory buffer. A context-dependent attacker could supply a specially crafted input file containing a long line to cause a stack-based buffer overlow, resulting in a denial of service (application crash) or potentially allowing the execution of arbitrary code.

- CVE-2014-1236 Sebastian Krahmer reported an overflow condition in the chkNum() function in lib/cgraph/scan.l that is triggered as the used regular expression accepts an arbitrary long digit list. With a specially crafted input file, a context-dependent attacker can cause a stack-based buffer overflow, resulting in a denial of service (application crash) or potentially allowing the execution of arbitrary code.

Solution

Upgrade the graphviz packages.

For the oldstable distribution (squeeze), these problems have been fixed in version 2.26.3-5+squeeze2.

For the stable distribution (wheezy), these problems have been fixed in version 2.26.3-14+deb7u1.

See Also

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=734745

https://security-tracker.debian.org/tracker/CVE-2014-0978

https://security-tracker.debian.org/tracker/CVE-2014-1236

https://packages.debian.org/source/squeeze/graphviz

https://packages.debian.org/source/wheezy/graphviz

https://www.debian.org/security/2014/dsa-2843

Plugin Details

Severity: Critical

ID: 71934

File Name: debian_DSA-2843.nasl

Version: 1.10

Type: local

Agent: unix

Published: 1/14/2014

Updated: 1/11/2021

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:graphviz, cpe:/o:debian:debian_linux:6.0, cpe:/o:debian:debian_linux:7.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Ease: No known exploits are available

Patch Publication Date: 1/13/2014

Reference Information

CVE: CVE-2014-0978, CVE-2014-1236

BID: 64674, 64737

DSA: 2843