First published: Thu May 06 2010(Updated: )
teTeX is an implementation of TeX. TeX takes a text file and a set of<br>formatting commands as input, and creates a typesetter-independent DeVice<br>Independent (DVI) file as output.<br>A buffer overflow flaw was found in the way teTeX processed virtual font<br>files when converting DVI files into PostScript. An attacker could create a<br>malicious DVI file that would cause the dvips executable to crash or,<br>potentially, execute arbitrary code. (CVE-2010-0827)<br>Multiple integer overflow flaws were found in the way teTeX processed<br>special commands when converting DVI files into PostScript. An attacker<br>could create a malicious DVI file that would cause the dvips executable to<br>crash or, potentially, execute arbitrary code. (CVE-2010-0739,<br>CVE-2010-1440)<br>A stack-based buffer overflow flaw was found in the way teTeX processed DVI<br>files containing HyperTeX references with long titles, when converting them<br>into PostScript. An attacker could create a malicious DVI file that would<br>cause the dvips executable to crash. (CVE-2007-5935)<br>teTeX embeds a copy of Xpdf, an open source Portable Document Format (PDF)<br>file viewer, to allow adding images in PDF format to the generated PDF<br>documents. The following issues affect Xpdf code:<br>Multiple integer overflow flaws were found in Xpdf. If a local user<br>generated a PDF file from a TeX document, referencing a specially-crafted<br>PDF file, it would cause Xpdf to crash or, potentially, execute arbitrary<br>code with the privileges of the user running pdflatex. (CVE-2009-0791,<br>CVE-2009-3609)<br>All users of tetex are advised to upgrade to these updated packages, which<br>contain backported patches to correct these issues.<br>
Affected Software | Affected Version | How to fix |
---|
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.