First published: Wed Feb 23 2011(Updated: )
A heap-based buffer overflow flaw was found in the way AFM font file parser, used for rendering of DVI files, in GNOME evince document viewer and other products, processed line tokens from the given input stream. A remote attacker could provide a DVI file, with embedded specially-crafted font file, and trick the local user to open it with an application using the AFM font parser, leading to that particular application crash or, potentially, arbitrary code execution with the privileges of the user running the application. Different vulnerability than <a href="https://access.redhat.com/security/cve/CVE-2010-2642">CVE-2010-2642</a>. Upstream bug report: [1] <a href="https://bugzilla.gnome.org/show_bug.cgi?id=640923">https://bugzilla.gnome.org/show_bug.cgi?id=640923</a> Upstream patch: [2] <a href="https://bugzilla.gnome.org/show_bug.cgi?id=640923#c1">https://bugzilla.gnome.org/show_bug.cgi?id=640923#c1</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Evince |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-679732 is high due to the potential for a heap-based buffer overflow allowing remote code execution.
To fix REDHAT-BUG-679732, update the GNOME evince document viewer to the latest version that includes the security patch.
The primary affected system of REDHAT-BUG-679732 is the GNOME evince document viewer.
Yes, REDHAT-BUG-679732 can be exploited remotely by an attacker providing a malicious DVI file.
Exploitation of REDHAT-BUG-679732 can lead to execution of arbitrary code on the affected system.