{"id":"CVE-2018-19492","details":"An issue was discovered in cairo.trm in Gnuplot 5.2.5. This issue allows an attacker to conduct a buffer overflow with an arbitrary amount of data in the cairotrm_options function. This flaw is caused by a missing size check of an argument passed to the \"set font\" function. This issue occurs when the Gnuplot pngcairo terminal is used as a backend.","modified":"2026-04-11T12:08:01.515855Z","published":"2018-11-23T17:29:00.407Z","related":["SUSE-SU-2019:0904-1","SUSE-SU-2020:1660-1","openSUSE-SU-2019:1216-1","openSUSE-SU-2024:10800-1"],"database_specific":{"unresolved_ranges":[{"extracted_events":[{"last_affected":"8.0"}],"cpe":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"15.0"}],"cpe":"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","source":"CPE_FIELD"}]},"references":[{"type":"WEB","url":"https://usn.ubuntu.com/4541-1/"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00066.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2018/11/msg00031.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2018/11/msg00035.html"},{"type":"FIX","url":"https://sourceforge.net/p/gnuplot/gnuplot-main/ci/d5020716834582b20a5e12cdd49f39ee4f9dd949/"},{"type":"EVIDENCE","url":"https://sourceforge.net/p/gnuplot/bugs/2089/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/gnuplot/gnuplot","events":[{"introduced":"0"},{"last_affected":"3a62a7533537cab5e409fcd64f7ddc33d8915c32"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"last_affected":"5.2.5"}],"cpe":"cpe:2.3:a:gnuplot:gnuplot:5.2.5:*:*:*:*:*:*:*","source":"CPE_FIELD"}}],"versions":["1.1","1.10A","2.0","3.0","3.1","3.2","3.5","4.0.2","5.2.0","5.2.1","5.2.2","5.2.3","5.2.5"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-19492.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}