An issue was discovered in datafile.c in Gnuplot 5.2.5. This issue allows an attacker to conduct a heap-based buffer overflow with an arbitrary amount of data in df_generate_ascii_array_entry. To exploit this vulnerability, an attacker must pass an overlong string as the right bound of the range argument that is passed to the plot function.
Subscriptions
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1595-1 | gnuplot5 security update |
Debian DLA |
DLA-1597-1 | gnuplot security update |
EUVD |
EUVD-2018-11179 | An issue was discovered in datafile.c in Gnuplot 5.2.5. This issue allows an attacker to conduct a heap-based buffer overflow with an arbitrary amount of data in df_generate_ascii_array_entry. To exploit this vulnerability, an attacker must pass an overlong string as the right bound of the range argument that is passed to the plot function. |
Ubuntu USN |
USN-4541-1 | Gnuplot vulnerabilities |
Ubuntu USN |
USN-7589-1 | Gnuplot vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T11:37:11.482Z
Reserved: 2018-11-23T00:00:00.000Z
Link: CVE-2018-19490
No data.
Status : Modified
Published: 2018-11-23T17:29:00.267
Modified: 2024-11-21T03:58:00.697
Link: CVE-2018-19490
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN