Gentoo Logo

teTeX, pTeX, CSTeX: Multiple overflows in included XPdf code

Content:

1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200603-02 / tetex
Release Date March 04, 2006
Latest Revision March 04, 2006: 01
Impact normal
Exploitable remote
Package Vulnerable versions Unaffected versions Architecture(s)
app-text/tetex < 2.0.2-r8 >= 2.0.2-r8 All supported architectures
app-text/cstetex < 2.0.2-r2 >= 2.0.2-r2 All supported architectures
app-text/ptex < 3.1.5-r1 >= 3.1.5-r1 All supported architectures

Related bugreports: #115775

Synopsis

CSTeTeX, pTeX, and teTeX include vulnerable XPdf code to handle PDF files, making them vulnerable to the execution of arbitrary code.

2.  Impact Information

Background

teTex is a complete TeX distribution. It is used for creating and manipulating LaTeX documents. CSTeX is a TeX distribution with Czech and Slovak support. pTeX is and ASCII publishing TeX distribution.

Description

CSTeX, teTex, and pTeX include XPdf code to handle PDF files. This XPdf code is vulnerable to several heap overflows (GLSA 200512-08) as well as several buffer and integer overflows discovered by Chris Evans (CESA-2005-003).

Impact

An attacker could entice a user to open a specially crafted PDF file with teTeX, pTeX or CSTeX, potentially resulting in the execution of arbitrary code with the rights of the user running the affected application.

3.  Resolution Information

Workaround

There is no known workaround at this time.

Resolution

All teTex users should upgrade to the latest version:

Code Listing 3.1: Resolution

# emerge --sync
# emerge --ask --oneshot --verbose ">=app-text/tetex-2.0.2-r8"

All CSTeX users should upgrade to the latest version:

Code Listing 3.2: Resolution

# emerge --sync
# emerge --ask --oneshot --verbose ">=app-text/cstetex-2.0.2-r2"

All pTeX users should upgrade to the latest version:

Code Listing 3.3: Resolution

# emerge --sync
# emerge --ask --oneshot --verbose ">=app-text/ptex-3.1.5-r1"

4.  References



Print

Page updated March 04, 2006

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2014 Gentoo Foundation, Inc. Questions, Comments? Contact us.