Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 199421 - app-text/tetex-3.x multiple vulnerabilities
Summary: app-text/tetex-3.x multiple vulnerabilities
Status: RESOLVED DUPLICATE of bug 198238
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High normal (vote)
Assignee: Gentoo Security
URL: http://secunia.com/advisories/27672/
Whiteboard: B4 [upstream]
Keywords:
Depends on:
Blocks:
 
Reported: 2007-11-17 08:57 UTC by Aniruddha
Modified: 2007-11-17 09:34 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Aniruddha 2007-11-17 08:57:26 UTC
TITLE:
teTeX Multiple Vulnerabilities

SECUNIA ADVISORY ID:
SA27672

VERIFY ADVISORY:
http://secunia.com/advisories/27672/

CRITICAL:
Less critical

IMPACT:
Manipulation of data, Exposure of sensitive information, DoS, System
access

WHERE:
>From remote

SOFTWARE:
teTeX 3.x
http://secunia.com/product/6388/

DESCRIPTION:
Some vulnerabilities have been reported in teTeX, which can be
exploited by malicious, local users to disclose and manipulate
sensitive information and by malicious people to potentially
compromise a vulnerable system.

1) A boundary error in dvips can be exploited to cause a stack-based
buffer overflow when a user is tricked into opening a specially
crafted DVI file containing an overly long hypertext reference.

Successful exploitation requires that dvips is invoked with the "-z"
option.

2) Some boundary errors in dviljk can be exploited to cause buffer
overflows when a user is enticed to print a specially crafted DVI
file.

Successful exploitation of vulnerabilities #1 and #2 may allow
execution of arbitrary code.

3) An error due to dvips using the insecure "tmpnam()" function when
converting DVI files can potentially be exploited to disclose and
modify sensitive information.

SOLUTION:
Do not process DVI files from untrusted sources. Grant only trusted
users access to affected systems.

PROVIDED AND/OR DISCOVERED BY:
1) Bastien Roucaries, reported via a Debian bug report.
2, 3) Joachim Schrod

ORIGINAL ADVISORY:
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=447081
http://bugs.gentoo.org/attachment.cgi?id=135423


Reproducible: Always
Comment 1 Jakub Moc (RETIRED) gentoo-dev 2007-11-17 09:34:31 UTC

*** This bug has been marked as a duplicate of bug 198238 ***