tetex
Page content
- Author: vmiklos
- Vulnerable: 3.0-12
- Unaffected: 3.0-13kalgan1
Some vulnerabilities have been reported in teTeX, which can be exploited by malicious, local users to disclose and manipulate sensitive information and by malicious people to potentially compromise a vulnerable system.
- A boundary error in dvips can be exploited to cause a stack-based buffer overflow when a user is tricked into opening a specially crafted DVI file containing an overly long hypertext reference. Successful exploitation requires that dvips is invoked with the “-z” option.
- Some boundary errors in dviljk can be exploited to cause buffer overflows when a user is enticed to print a specially crafted DVI file. Successful exploitation of vulnerabilities #1 and #2 may allow execution of arbitrary code.
- An error due to dvips using the insecure “tmpnam()” function when converting DVI files can potentially be exploited to disclose and modify sensitive information.
- Bug Tracker URL: http://bugs.frugalware.org/task/2592