First published: Thu May 06 2010(Updated: )
teTeX is an implementation of TeX. TeX takes a text file and a set of<br>formatting commands as input, and creates a typesetter-independent DeVice<br>Independent (DVI) file as output.<br>A buffer overflow flaw was found in the way teTeX processed virtual font<br>files when converting DVI files into PostScript. An attacker could create a<br>malicious DVI file that would cause the dvips executable to crash or,<br>potentially, execute arbitrary code. (CVE-2010-0827)<br>Multiple integer overflow flaws were found in the way teTeX processed<br>special commands when converting DVI files into PostScript. An attacker<br>could create a malicious DVI file that would cause the dvips executable to<br>crash or, potentially, execute arbitrary code. (CVE-2010-0739,<br>CVE-2010-1440)<br>A stack-based buffer overflow flaw was found in the way teTeX processed DVI<br>files containing HyperTeX references with long titles, when converting them<br>into PostScript. An attacker could create a malicious DVI file that would<br>cause the dvips executable to crash. (CVE-2007-5935)<br>teTeX embeds a copy of Xpdf, an open source Portable Document Format (PDF)<br>file viewer, to allow adding images in PDF format to the generated PDF<br>documents. The following issues affect Xpdf code:<br>Multiple integer overflow flaws were found in Xpdf. If a local user<br>generated a PDF file from a TeX document, referencing a specially-crafted<br>PDF file, it would cause Xpdf to crash or, potentially, execute arbitrary<br>code with the privileges of the user running pdflatex. (CVE-2009-0791,<br>CVE-2009-3609)<br>All users of tetex are advised to upgrade to these updated packages, which<br>contain backported patches to correct these issues.<br>
Affected Software | Affected Version | How to fix |
---|---|---|
teTeX |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability RHSA-2010:0401 has been classified as a high severity due to its potential for remote code execution.
To fix RHSA-2010:0401, you should update teTeX to the latest version provided by your vendor.
The RHSA-2010:0401 vulnerability is caused by a buffer overflow flaw in teTeX when processing virtual font files.
Anyone using an affected version of teTeX is potentially vulnerable to the security issues described in RHSA-2010:0401.
Currently, there are no known workarounds for the vulnerabilities identified in RHSA-2010:0401 other than applying the provided updates.