Description
An issue was discovered in post.trm in Gnuplot 5.2.5. This issue allows an attacker to conduct a buffer overflow with an arbitrary amount of data in the PS_options function. This flaw is caused by a missing size check of an argument passed to the "set font" function. This issue occurs when the Gnuplot postscript terminal is used as a backend.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1595-1 | gnuplot5 security update |
Debian DLA |
DLA-1597-1 | gnuplot security update |
EUVD |
EUVD-2018-11180 | An issue was discovered in post.trm in Gnuplot 5.2.5. This issue allows an attacker to conduct a buffer overflow with an arbitrary amount of data in the PS_options function. This flaw is caused by a missing size check of an argument passed to the "set font" function. This issue occurs when the Gnuplot postscript terminal is used as a backend. |
Ubuntu USN |
USN-4541-1 | Gnuplot vulnerabilities |
Ubuntu USN |
USN-7589-1 | Gnuplot vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T11:37:11.479Z
Reserved: 2018-11-23T00:00:00.000Z
Link: CVE-2018-19491
No data.
Status : Modified
Published: 2018-11-23T17:29:00.347
Modified: 2024-11-21T03:58:00.860
Link: CVE-2018-19491
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN