GLSA-200709-17 : teTeX: Multiple buffer overflows

This script is Copyright (C) 2007-2014 Tenable Network Security, Inc.


Synopsis :

The remote Gentoo host is missing one or more security-related
patches.

Description :

The remote host is affected by the vulnerability described in GLSA-200709-17
(teTeX: Multiple buffer overflows)

Mark Richters discovered a buffer overflow in the open_sty() function
in file mkind.c. Other vulnerabilities have also been discovered in the
same file but might not be exploitable (CVE-2007-0650). Tetex also
includes vulnerable code from GD library (GLSA 200708-05), and from
Xpdf (CVE-2007-3387).

Impact :

A remote attacker could entice a user to process a specially crafted
PNG, GIF or PDF file, or to execute 'makeindex' on an overly long
filename. In both cases, this could lead to the remote execution of
arbitrary code with the privileges of the user running the application.

Workaround :

There is no known workaround at this time.

See also :

http://www.gentoo.org/security/en/glsa/glsa-200708-05.xml
http://www.gentoo.org/security/en/glsa/glsa-200709-17.xml

Solution :

All teTeX users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=app-text/tetex-3.0_p1-r4'

Risk factor :

Medium / CVSS Base Score : 6.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)
Public Exploit Available : true

Family: Gentoo Local Security Checks

Nessus Plugin ID: 26215 (gentoo_GLSA-200709-17.nasl)

Bugtraq ID:

CVE ID: CVE-2007-0650
CVE-2007-3387