Rapid7 Vulnerability & Exploit Database

Red Hat: CVE-2020-18032: CVE-2020-18032 graphviz: off-by-one in parse_reclbl() in lib/common/shapes.c (Multiple Advisories)

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

Red Hat: CVE-2020-18032: CVE-2020-18032 graphviz: off-by-one in parse_reclbl() in lib/common/shapes.c (Multiple Advisories)

Severity
7
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
Published
04/29/2021
Created
11/11/2021
Added
11/10/2021
Modified
12/15/2023

Description

Buffer Overflow in Graphviz Graph Visualization Tools from commit ID f8b9e035 and earlier allows remote attackers to execute arbitrary code or cause a denial of service (application crash) by loading a crafted file into the "lib/common/shapes.c" component.

Solution(s)

  • redhat-upgrade-graphviz
  • redhat-upgrade-graphviz-debuginfo
  • redhat-upgrade-graphviz-debugsource
  • redhat-upgrade-graphviz-devel
  • redhat-upgrade-graphviz-doc
  • redhat-upgrade-graphviz-gd
  • redhat-upgrade-graphviz-gd-debuginfo
  • redhat-upgrade-graphviz-guile-debuginfo
  • redhat-upgrade-graphviz-java-debuginfo
  • redhat-upgrade-graphviz-lua-debuginfo
  • redhat-upgrade-graphviz-ocaml-debuginfo
  • redhat-upgrade-graphviz-perl-debuginfo
  • redhat-upgrade-graphviz-python3
  • redhat-upgrade-graphviz-python3-debuginfo
  • redhat-upgrade-graphviz-ruby-debuginfo
  • redhat-upgrade-graphviz-tcl-debuginfo

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;