First published: Thu Dec 30 2010(Updated: )
An array index error in the parser for PK font files, which is used for rendering DVI files, in the GNOME evince document viewer can lead to local or remote code execution. Due to insufficient bounds checks when writing to elements in an array, it's possible to overwrite the address of a function pointer, leading to possible arbitrary code execution. Common Vulnerabilities and Exposures assigned an identifier <a href="https://access.redhat.com/security/cve/CVE-2010-2640">CVE-2010-2640</a> to this issue. The vulnerability is present in the code that handles loading of fonts used by DVI files.To exploit you need two files, a DVI file and the malicious font. The vulnerability is triggered not only by opening the document in evince, but also by browsing to a folder which contains the malicious files, where evince thumbnailer will load the malicious file to generate a thumbnail for it. Acknowledgements: Red Hat would like to thank the Evince development team for reporting this issue. Upstream acknowledges Jon Larimer of IBM X-Force as the original reporter.
Affected Software | Affected Version | How to fix |
---|---|---|
Evince |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-666313 is high due to the potential for local or remote code execution.
To fix REDHAT-BUG-666313, update GNOME Evince to the latest version where the vulnerability has been patched.
REDHAT-BUG-666313 affects multiple versions of GNOME Evince, particularly those prior to the security fix.
Yes, remote exploitation is possible with REDHAT-BUG-666313 due to the vulnerability in the document viewer.
Exploiting REDHAT-BUG-666313 could allow an attacker to execute arbitrary code on the affected system.