{"id":"CVE-2018-19490","details":"An issue was discovered in datafile.c in Gnuplot 5.2.5. This issue allows an attacker to conduct a heap-based buffer overflow with an arbitrary amount of data in df_generate_ascii_array_entry. To exploit this vulnerability, an attacker must pass an overlong string as the right bound of the range argument that is passed to the plot function.","modified":"2026-03-20T11:24:14.022543Z","published":"2018-11-23T17:29:00.267Z","related":["SUSE-SU-2019:0904-1","SUSE-SU-2020:1660-1","openSUSE-SU-2019:1216-1","openSUSE-SU-2024:10800-1"],"references":[{"type":"WEB","url":"https://usn.ubuntu.com/4541-1/"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00066.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2018/11/msg00031.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2018/11/msg00035.html"},{"type":"FIX","url":"https://sourceforge.net/p/gnuplot/gnuplot-main/ci/d5020716834582b20a5e12cdd49f39ee4f9dd949/"},{"type":"EVIDENCE","url":"https://sourceforge.net/p/gnuplot/bugs/2093/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/gnuplot/gnuplot","events":[{"introduced":"0"},{"last_affected":"3a62a7533537cab5e409fcd64f7ddc33d8915c32"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"5.2.5"}]}}],"versions":["1.1","1.10A","2.0","3.0","3.1","3.2","3.5","4.0.2","5.2.0","5.2.1","5.2.2","5.2.3","5.2.5"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"15.0"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-19490.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}