First published: Tue Nov 06 2007(Updated: )
Description of problem: DVI file that contains a hypertex reference with long title can trigger a stack based buffer overflow of a statically sized char array when dvips is called with -z argument. This could possibly result in arbitrary code execution in case user was tricked into open a specially crafted DVI file. Additional info: This issue affects the versions of the tetex package, as shipped with Red Hat Enterprise Linux 3 and 4. This issue has no security impact on tetex package version, as shipped in Red Hat Enterprise Linux 5 due to _FORTIFY_SOURCE protection that terminates the process before the memory corruption occurs. This issue has no security impact on texlive package versions, as shipped with Fedora releases of 11 and 12, due to _FORTIFY_SOURCE protection that terminates the process before the memory corruption occurs. See URL field for the orginal bug report from Debian project.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/3.0 | <40.3. | 40.3. |
teTeX | ||
TeX Live |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-5935 has a high severity due to the potential for arbitrary code execution resulting from a stack-based buffer overflow.
To fix CVE-2007-5935, update to the patched versions of the affected software provided by your vendor.
CVE-2007-5935 affects teTeX and TeX Live 2007, specifically versions prior to 40.3.
Yes, CVE-2007-5935 can potentially be exploited remotely if a user is tricked into processing a crafted DVI file.
CVE-2007-5935 is a stack-based buffer overflow vulnerability.