[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[FD] Buffer Overflow in graphviz via via a crafted config6a file
- To: "fulldisclosure@xxxxxxxxxxxx" <fulldisclosure@xxxxxxxxxxxx>
- Subject: [FD] Buffer Overflow in graphviz via via a crafted config6a file
- From: Meng Ruijie <ruijie_meng@xxxxxxxxx>
- Date: Sat, 20 Jan 2024 04:07:35 +0000
[Vulnerability description]
Buffer Overflow vulnerability in graphviz v.2.43.0 allows a remote attacker to
execute arbitrary code via a crafted config6a file.
[Vulnerability Type]
Buffer Overflow
[Vendor of Product]
graphviz
[Affected Product Code Base]
graphviz - 2.43.0
[Reference]
https://gitlab.com/graphviz/graphviz/-/issues/2441
[CVE Reference]
The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned
the name CVE-2023-46045 to this vulnerability.
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: https://seclists.org/fulldisclosure/