Lucene search

K
gentooGentoo FoundationGLSA-200709-17
HistorySep 27, 2007 - 12:00 a.m.

teTeX: Multiple buffer overflows

2007-09-2700:00:00
Gentoo Foundation
security.gentoo.org
21

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

EPSS

0.065

Percentile

93.8%

Background

teTeX is a complete TeX distribution for editing documents.

Description

Mark Richters discovered a buffer overflow in the open_sty() function in file mkind.c. Other vulnerabilities have also been discovered in the same file but might not be exploitable (CVE-2007-0650). Tetex also includes vulnerable code from GD library (GLSA 200708-05), and from Xpdf (CVE-2007-3387).

Impact

A remote attacker could entice a user to process a specially crafted PNG, GIF or PDF file, or to execute “makeindex” on an overly long filename. In both cases, this could lead to the remote execution of arbitrary code with the privileges of the user running the application.

Workaround

There is no known workaround at this time.

Resolution

All teTeX users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=app-text/tetex-3.0_p1-r4"
OSVersionArchitecturePackageVersionFilename
Gentooanyallapp-text/tetex< 3.0_p1-r4UNKNOWN

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

EPSS

0.065

Percentile

93.8%