First published: Mon Nov 16 2015(Updated: )
A format string vulnerability was found in CmdKeywords function when processing \keywords command in tex file. When the user runs latex2rtf with malicious crafted tex file, an attacker can execute arbitrary code. The variable `keywords' in the function CmdKeywords may hold a malicious input string, which can be used as a format argument of vsnprintf. Vulnerable code: 1789 char *keywords = getBraceParam(); ... 1798 fprintRTF(keywords); ... 858 void fprintRTF(char *format, ...){ ... 873 vsnprintf(buffer, 1024, format, apf); ... Public disclosure (includes reproducer and suggested fix): <a href="http://seclists.org/oss-sec/2015/q4/283">http://seclists.org/oss-sec/2015/q4/283</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Weblate | =2.3.8 | |
Red Hat Fedora | =22 | |
Red Hat Fedora | =23 | |
Red Hat Fedora | =24 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-8106 is considered a high-severity vulnerability due to the potential for arbitrary code execution.
To fix CVE-2015-8106, upgrade to latex2rtf version 2.3.9 or later where the vulnerability has been addressed.
CVE-2015-8106 affects latex2rtf version 2.3.8 and earlier releases.
Yes, CVE-2015-8106 can be exploited remotely if a user processes a maliciously crafted tex file with latex2rtf.
CVE-2015-8106 impacts latex2rtf as well as Fedora versions 22, 23, and 24 that utilize the affected latex2rtf software.