Vulnerability Details : CVE-2018-19492
An issue was discovered in cairo.trm in Gnuplot 5.2.5. This issue allows an attacker to conduct a buffer overflow with an arbitrary amount of data in the cairotrm_options function. This flaw is caused by a missing size check of an argument passed to the "set font" function. This issue occurs when the Gnuplot pngcairo terminal is used as a backend.
Vulnerability category: Overflow
Products affected by CVE-2018-19492
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:a:gnuplot:gnuplot:5.2.5:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2018-19492
0.10%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 41 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-19492
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST | |
7.8
|
HIGH | CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
CWE ids for CVE-2018-19492
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2018-19492
-
https://lists.debian.org/debian-lts-announce/2018/11/msg00035.html
[SECURITY] [DLA 1597-1] gnuplot security updateMailing List;Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00066.html
[security-announce] openSUSE-SU-2019:1216-1: moderate: Security update fMailing List;Third Party Advisory
-
https://sourceforge.net/p/gnuplot/bugs/2089/
gnuplot / Bugs / #2089 Buffer overflow in setfont of pngcairo terminalExploit;Third Party Advisory
-
https://lists.debian.org/debian-lts-announce/2018/11/msg00031.html
[SECURITY] [DLA 1595-1] gnuplot5 security updateMailing List;Third Party Advisory
-
https://usn.ubuntu.com/4541-1/
USN-4541-1: Gnuplot vulnerabilities | Ubuntu security notices | Ubuntu
-
https://sourceforge.net/p/gnuplot/gnuplot-main/ci/d5020716834582b20a5e12cdd49f39ee4f9dd949/
gnuplot / gnuplot-main / Commit [d50207]Patch;Third Party Advisory
Jump to