First published: Tue Nov 06 2007(Updated: )
Description of problem: dviljk contains multiple buffer overflow conditions that can be triggered by a DVI input file. This could possibly result in arbitrary code execution in case user was tricked into print a specially crafted DVI file. Additional info: See URL filed for Gentoo report. The <span class=""><a href="attachment.cgi?id=249481&action=diff" name="attach_249481" title="Fix for dviljk buffer overflows and /tmp race">attachment #249481</a> <a href="attachment.cgi?id=249481&action=edit" title="Fix for dviljk buffer overflows and /tmp race">[details]</a></span> fixes this bug together with <a class="bz_bug_link bz_status_CLOSED bz_closed bz_public " title="CLOSED ERRATA - CVE-2007-5936 dviljk uses insecure temporary file" href="show_bug.cgi?id=368611">bug #368611</a> It will most likely need some mungling as whitespace changes make the fixes less obvious.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/3.0 | <40.3. | 40.3. |
teTeX | ||
TeX Live |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-5937 has a high severity due to the potential for arbitrary code execution.
To fix CVE-2007-5937, update the affected teTeX or TeX Live packages to the latest version provided by your distribution.
CVE-2007-5937 affects teTeX versions up to 3.0-40.3 and TeX Live 2007.
CVE-2007-5937 is a buffer overflow vulnerability that can be triggered by specially crafted DVI input files.
Yes, exploiting CVE-2007-5937 could lead to unauthorized code execution, posing significant security risks.