Description
Graphviz 2.36.0 through 9.x before 10.0.1 has an out-of-bounds read via a crafted config6a file. NOTE: exploitability may be uncommon because this file is typically owned by root.
References (8)
Core 8
Core References
Exploit, Issue Tracking
https://gitlab.com/graphviz/graphviz/-/issues/2441
Mailing List, Third Party Advisory
https://seclists.org/fulldisclosure/2024/Jan/73
Mailing List
https://seclists.org/fulldisclosure/2024/Feb/24
Mailing List
http://seclists.org/fulldisclosure/2024/Jan/62
Mailing List
http://seclists.org/fulldisclosure/2024/Jan/73
Exploit, Third Party Advisory
http://packetstormsecurity.com/files/176816/graphviz-2.43.0-Buffer-Overflow-Code-Execution.html
Mailing List mailing-list
http://seclists.org/fulldisclosure/2024/Feb/24
Scores
CVSS v3
7.8
EPSS
0.0004
EPSS Percentile
12.1%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
total
Details
CWE
CWE-125
Status
published
Products (1)
graphviz/graphviz
2.36.0 - 10.0.0
Published
Feb 02, 2024
Tracked Since
Feb 18, 2026