First published: Wed Feb 23 2011(Updated: )
A heap-based buffer overflow flaw was found in the way AFM font file parser, used for rendering of DVI files, in GNOME evince document viewer and other products, processed line tokens from the given input stream. A remote attacker could provide a DVI file, with embedded specially-crafted font file, and trick the local user to open it with an application using the AFM font parser, leading to that particular application crash or, potentially, arbitrary code execution with the privileges of the user running the application. Different vulnerability than <a href="https://access.redhat.com/security/cve/CVE-2010-2642">CVE-2010-2642</a>. Upstream bug report: [1] <a href="https://bugzilla.gnome.org/show_bug.cgi?id=640923">https://bugzilla.gnome.org/show_bug.cgi?id=640923</a> Upstream patch: [2] <a href="https://bugzilla.gnome.org/show_bug.cgi?id=640923#c1">https://bugzilla.gnome.org/show_bug.cgi?id=640923#c1</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
teTeX | =3.0 | |
Evince | ||
CentOS T1lib |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-0433 is considered a high severity vulnerability due to its potential for remote code execution through a heap-based buffer overflow.
To fix CVE-2011-0433, update the affected GNOME Evince, t1lib, or teTeX packages to the latest versions that contain the security patch.
CVE-2011-0433 affects GNOME Evince, t1lib, and teTeX 3.0, particularly in their processing of DVI files with special font files.
Yes, CVE-2011-0433 can be exploited remotely by sending a specially crafted DVI file to a vulnerable system.
CVE-2011-0433 could enable attackers to execute arbitrary code on a victim's machine, leading to a full system compromise.