GLSA-200709-17 : teTeX: Multiple buffer overflows

This script is Copyright (C) 2007-2015 Tenable Network Security, Inc.

Synopsis :

The remote Gentoo host is missing one or more security-related

Description :

The remote host is affected by the vulnerability described in GLSA-200709-17
(teTeX: Multiple buffer overflows)

Mark Richters discovered a buffer overflow in the open_sty() function
in file mkind.c. Other vulnerabilities have also been discovered in the
same file but might not be exploitable (CVE-2007-0650). Tetex also
includes vulnerable code from GD library (GLSA 200708-05), and from
Xpdf (CVE-2007-3387).

Impact :

A remote attacker could entice a user to process a specially crafted
PNG, GIF or PDF file, or to execute 'makeindex' on an overly long
filename. In both cases, this could lead to the remote execution of
arbitrary code with the privileges of the user running the application.

Workaround :

There is no known workaround at this time.

See also :

Solution :

All teTeX users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=app-text/tetex-3.0_p1-r4'

Risk factor :

Medium / CVSS Base Score : 6.8
Public Exploit Available : true

Family: Gentoo Local Security Checks

Nessus Plugin ID: 26215 (gentoo_GLSA-200709-17.nasl)

Bugtraq ID:

CVE ID: CVE-2007-0650

Ready to Scan Unlimited IPs & Run Compliance Checks?

Upgrade to Nessus Professional today!

Buy Now

Combine the Power of Nessus with the Ease of Cloud

Start your free Nessus Cloud trial now!

Begin Free Trial