Summary
The remote host is missing an update to graphviz
announced via advisory MDVSA-2009:254-1.
Solution
To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:254-1
Insight
A vulnerability was discovered and corrected in graphviz:
Stack-based buffer overflow in the push_subg function in parser.y (lib/graph/parser.c) in Graphviz 2.20.2, and possibly earlier versions, allows user-assisted remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a DOT file with a large number of Agraph_t elements (CVE-2008-4555).
This update provides a fix for this vulnerability.
Update:
Packages for 2008.0 are being provided due to extended support for Corporate products.
Affected: 2008.0
Severity
Classification
-
CVE CVE-2008-4555 -
CVSS Base Score: 8.5
AV:N/AC:M/Au:S/C:C/I:C/A:C
Related Vulnerabilities