CVE-2008-4555Improper Restriction of Operations within the Bounds of a Memory Buffer in Graphviz

Severity
8.5HIGHNVD
EPSS
5.2%
top 10.03%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 14
Latest updateMay 2

Description

Stack-based buffer overflow in the push_subg function in parser.y (lib/graph/parser.c) in Graphviz 2.20.2, and possibly earlier versions, allows user-assisted remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a DOT file with a large number of Agraph_t elements.

CVSS vector

AV:N/AC:M/C:C/I:C/A:CExploitability: 6.8 | Impact: 10.0

Affected Packages3 packages

debiandebian/graphviz< graphviz 2.20.2-3 (bookworm)
Debiangraphviz/graphviz< 2.20.2-3+3
NVDgraphviz/graphviz2.20.2+39

Patches

🔴Vulnerability Details

2
GHSA
GHSA-j3qg-vccx-mj8v: Stack-based buffer overflow in the push_subg function in parser2022-05-02
OSV
CVE-2008-4555: Stack-based buffer overflow in the push_subg function in parser2008-10-14

📋Vendor Advisories

2
Red Hat
graphviz: buffer overflow in the graph parser2008-10-08
Debian
CVE-2008-4555: graphviz - Stack-based buffer overflow in the push_subg function in parser.y (lib/graph/par...2008

💬Community

1
Bugzilla
CVE-2008-4555 graphviz: buffer overflow in the graph parser2008-10-14