{"id":"CVE-2020-18032","details":"Buffer Overflow in Graphviz Graph Visualization Tools from commit ID f8b9e035 and earlier allows remote attackers to execute arbitrary code or cause a denial of service (application crash) by loading a crafted file into the \"lib/common/shapes.c\" component.","modified":"2026-01-30T13:43:45.848266Z","published":"2021-04-29T18:15:08.793Z","related":["ALSA-2021:4256","CGA-w82j-rqj6-whph","MGASA-2021-0228","SUSE-SU-2021:1646-1","SUSE-SU-2021:1651-1","openSUSE-SU-2021:0757-1","openSUSE-SU-2021:1651-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D5PQPHJHPU46FK3R5XBP3XDT4X37HMPC/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QGY2IGARE6RZHTF2UEZEWLMQCDILFK6A/"},{"type":"ADVISORY","url":"https://gitlab.com/graphviz/graphviz/-/issues/1700"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2021/05/msg00014.html"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202107-04"},{"type":"ADVISORY","url":"https://www.debian.org/security/2021/dsa-4914"},{"type":"REPORT","url":"https://security.gentoo.org/glsa/202107-04"},{"type":"FIX","url":"https://gitlab.com/graphviz/graphviz/-/issues/1700"},{"type":"ARTICLE","url":"https://lists.debian.org/debian-lts-announce/2021/05/msg00014.html"},{"type":"EVIDENCE","url":"https://gitlab.com/graphviz/graphviz/-/issues/1700"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://gitlab.com/graphviz/graphviz","events":[{"introduced":"0"},{"fixed":"4f263aeb7fccdfac1e71a305f437a997385bdf59"}]}],"versions":["2.38.0","2.40.0","2.40.1","2.42.0","2.42.2","2.42.3","2.42.4","2.44.0","2.44.1","LAST_LIBGRAPH","TRAVIS_CI_BUILD_EXPERIMENTAL","stable_release_2.42.0","stable_release_2.42.2","stable_release_2.42.3","stable_release_2.42.4","stable_release_2.44.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-18032.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}