CVE-2018-19491 — Improper Restriction of Operations within the Bounds of a Memory Buffer in Gnuplot
Severity
7.8HIGHNVD
EPSS
0.2%
top 55.14%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedNov 23
Latest updateJun 23
Description
An issue was discovered in post.trm in Gnuplot 5.2.5. This issue allows an attacker to conduct a buffer overflow with an arbitrary amount of data in the PS_options function. This flaw is caused by a missing size check of an argument passed to the "set font" function. This issue occurs when the Gnuplot postscript terminal is used as a backend.
CVSS vector
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9
Affected Packages5 packages
Also affects: Debian Linux 8.0
Patches
🔴Vulnerability Details
4📋Vendor Advisories
4💬Community
3Bugzilla▶
CVE-2018-19491 gnuplot44: gnuplot: buffer overflow with an arbitrary amount of data in the PS_options [epel-6]↗2018-12-04
Bugzilla▶
CVE-2018-19491 gnuplot: buffer overflow with an arbitrary amount of data in the PS_options [fedora-all]↗2018-12-04
Bugzilla▶
CVE-2018-19491 gnuplot: buffer overflow with an arbitrary amount of data in the PS_options↗2018-12-04