Format string vulnerability in the yyerror function in lib/cgraph/scan.l in Graphviz allows remote attackers to have unspecified impact via format string specifiers in unknown vectors, which are not properly handled in an error string.
The product uses a function that accepts a format string as an argument, but the format string originates from an external source.
Link | Tags |
---|---|
http://www.mandriva.com/security/advisories?name=MDVSA-2014:248 | vendor advisory broken link |
https://exchange.xforce.ibmcloud.com/vulnerabilities/98949 | vdb entry third party advisory |
http://www.mandriva.com/security/advisories?name=MDVSA-2015:187 | vendor advisory broken link |
http://seclists.org/oss-sec/2014/q4/872 | mailing list exploit third party advisory |
http://advisories.mageia.org/MGASA-2014-0520.html | third party advisory |
http://www.securityfocus.com/bid/71283 | vdb entry third party advisory broken link |
https://github.com/ellson/graphviz/commit/99eda421f7ddc27b14e4ac1d2126e5fe41719081 | third party advisory exploit |
http://www.debian.org/security/2014/dsa-3098 | third party advisory vendor advisory |
http://secunia.com/advisories/60166 | third party advisory broken link |
http://seclists.org/oss-sec/2014/q4/784 | mailing list exploit third party advisory |