First published: Tue Nov 06 2007(Updated: )
Description of problem: DVI file that contains a hypertex reference with long title can trigger a stack based buffer overflow of a statically sized char array when dvips is called with -z argument. This could possibly result in arbitrary code execution in case user was tricked into open a specially crafted DVI file. Additional info: This issue affects the versions of the tetex package, as shipped with Red Hat Enterprise Linux 3 and 4. This issue has no security impact on tetex package version, as shipped in Red Hat Enterprise Linux 5 due to _FORTIFY_SOURCE protection that terminates the process before the memory corruption occurs. This issue has no security impact on texlive package versions, as shipped with Fedora releases of 11 and 12, due to _FORTIFY_SOURCE protection that terminates the process before the memory corruption occurs. See URL field for the orginal bug report from Debian project.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/3.0 | <40.3. | 40.3. |
Tug Texlive 2007 | ||
Tetex Tetex |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.