First published: Fri Mar 12 2010(Updated: )
Dan Rosenberg found a buffer overflow flaw in the way TeX text formatting system processed virtual font files. If a user was tricked into processing a specially-crafted typesetter-independent .dvi (DeVice Independent) file, it could lead to dvips executable crash or, potentially, to arbitrary code execution with the privileges of the user running dvips.
Credit: security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tex Live | <=2009 | |
Tex Live | =1996 | |
Tex Live | =1998 | |
Tex Live | =1999 | |
Tex Live | =2000 | |
Tex Live | =2001 | |
Tex Live | =2002 | |
Tex Live | =2003 | |
Tex Live | =2004 | |
Tex Live | =2005 | |
Tex Live | =2007 | |
Tex Live | =2008 | |
teTeX |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-0827 has a high severity due to the potential for arbitrary code execution from a buffer overflow.
To fix CVE-2010-0827, update TeX Live or teTeX to the latest version that has addressed this vulnerability.
CVE-2010-0827 affects TeX Live versions from 1996 to 2009 and certain versions of teTeX.
The impact of CVE-2010-0827 includes the possibility of crashes or execution of arbitrary code via specially crafted .dvi files.
CVE-2010-0827 was discovered by security researcher Dan Rosenberg.