First published: Thu May 06 2010(Updated: )
teTeX is an implementation of TeX. TeX takes a text file and a set of<br>formatting commands as input, and creates a typesetter-independent DeVice<br>Independent (DVI) file as output.<br>A buffer overflow flaw was found in the way teTeX processed virtual font<br>files when converting DVI files into PostScript. An attacker could create a<br>malicious DVI file that would cause the dvips executable to crash or,<br>potentially, execute arbitrary code. (CVE-2010-0827)<br>Multiple integer overflow flaws were found in the way teTeX processed<br>special commands when converting DVI files into PostScript. An attacker<br>could create a malicious DVI file that would cause the dvips executable to<br>crash or, potentially, execute arbitrary code. (CVE-2010-0739,<br>CVE-2010-1440)<br>A stack-based buffer overflow flaw was found in the way teTeX processed DVI<br>files containing HyperTeX references with long titles, when converting them<br>into PostScript. An attacker could create a malicious DVI file that would<br>cause the dvips executable to crash. (CVE-2007-5935)<br>teTeX embeds a copy of Xpdf, an open source Portable Document Format (PDF)<br>file viewer, to allow adding images in PDF format to the generated PDF<br>documents. The following issues affect Xpdf code:<br>Multiple integer overflow flaws were found in Xpdf's JBIG2 decoder. If a<br>local user generated a PDF file from a TeX document, referencing a<br>specially-crafted PDF file, it would cause Xpdf to crash or, potentially,<br>execute arbitrary code with the privileges of the user running pdflatex.<br>(CVE-2009-0147, CVE-2009-1179)<br>Multiple integer overflow flaws were found in Xpdf. If a local user<br>generated a PDF file from a TeX document, referencing a specially-crafted<br>PDF file, it would cause Xpdf to crash or, potentially, execute arbitrary<br>code with the privileges of the user running pdflatex. (CVE-2009-0791,<br>CVE-2009-3609)<br>A heap-based buffer overflow flaw was found in Xpdf's JBIG2 decoder. If a<br>local user generated a PDF file from a TeX document, referencing a<br>specially-crafted PDF file, it would cause Xpdf to crash or, potentially,<br>execute arbitrary code with the privileges of the user running pdflatex.<br>(CVE-2009-0195)<br>Multiple buffer overflow flaws were found in Xpdf's JBIG2 decoder. If a<br>local user generated a PDF file from a TeX document, referencing a<br>specially-crafted PDF file, it would cause Xpdf to crash or, potentially,<br>execute arbitrary code with the privileges of the user running pdflatex.<br>(CVE-2009-0146, CVE-2009-1182)<br>Multiple flaws were found in Xpdf's JBIG2 decoder that could lead to the<br>freeing of arbitrary memory. If a local user generated a PDF file from a<br>TeX document, referencing a specially-crafted PDF file, it would cause<br>Xpdf to crash or, potentially, execute arbitrary code with the privileges<br>of the user running pdflatex. (CVE-2009-0166, CVE-2009-1180)<br>Multiple input validation flaws were found in Xpdf's JBIG2 decoder. If a<br>local user generated a PDF file from a TeX document, referencing a<br>specially-crafted PDF file, it would cause Xpdf to crash or, potentially,<br>execute arbitrary code with the privileges of the user running pdflatex.<br>(CVE-2009-0800)<br>Multiple denial of service flaws were found in Xpdf's JBIG2 decoder. If a<br>local user generated a PDF file from a TeX document, referencing a<br>specially-crafted PDF file, it would cause Xpdf to crash. (CVE-2009-0799,<br>CVE-2009-1181, CVE-2009-1183)<br>Red Hat would like to thank Braden Thomas and Drew Yao of the Apple Product<br>Security team, Will Dormann of the CERT/CC, and Alin Rad Pop of Secunia<br>Research, for responsibly reporting the Xpdf flaws.<br>All users of tetex are advised to upgrade to these updated packages, which<br>contain backported patches to correct these issues.<br>
Affected Software | Affected Version | How to fix |
---|
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.