An issue was discovered in post.trm in Gnuplot 5.2.5. This issue allows an attacker to conduct a buffer overflow with an arbitrary amount of data in the PS_options function. This flaw is caused by a missing size check of an argument passed to the "set font" function. This issue occurs when the Gnuplot postscript terminal is used as a backend.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1595-1 | gnuplot5 security update |
Debian DLA |
DLA-1597-1 | gnuplot security update |
EUVD |
EUVD-2018-11180 | An issue was discovered in post.trm in Gnuplot 5.2.5. This issue allows an attacker to conduct a buffer overflow with an arbitrary amount of data in the PS_options function. This flaw is caused by a missing size check of an argument passed to the "set font" function. This issue occurs when the Gnuplot postscript terminal is used as a backend. |
Ubuntu USN |
USN-4541-1 | Gnuplot vulnerabilities |
Ubuntu USN |
USN-7589-1 | Gnuplot vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T11:37:11.479Z
Reserved: 2018-11-23T00:00:00
Link: CVE-2018-19491
No data.
Status : Modified
Published: 2018-11-23T17:29:00.347
Modified: 2024-11-21T03:58:00.860
Link: CVE-2018-19491
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN