GLSA-200501-31 : teTeX, pTeX, CSTeX: Multiple vulnerabilities

This script is Copyright (C) 2005-2015 Tenable Network Security, Inc.

Synopsis :

The remote Gentoo host is missing one or more security-related

Description :

The remote host is affected by the vulnerability described in GLSA-200501-31
(teTeX, pTeX, CSTeX: Multiple vulnerabilities)

teTeX, pTeX and CSTeX all make use of Xpdf code and may therefore
be vulnerable to the various overflows that were discovered in Xpdf
code (CAN-2004-0888, CAN-2004-0889, CAN-2004-1125 and CAN-2005-0064).
Furthermore, Javier Fernandez-Sanguino Pena discovered that the
xdvizilla script does not handle temporary files correctly.

Impact :

An attacker could design a malicious input file which, when
processed using one of the TeX distributions, could lead to the
execution of arbitrary code. Furthermore, a local attacker could create
symbolic links in the temporary files directory, pointing to a valid
file somewhere on the filesystem. When xdvizilla is called, this would
result in the file being overwritten with the rights of the user
running the script.

Workaround :

There is no known workaround at this time.

See also :

Solution :

All teTeX users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=app-text/tetex-2.0.2-r5'
All CSTeX users should also upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=app-text/cstetex-2.0.2-r1'
Finally, all pTeX users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=app-text/ptex-3.1.4-r2'

Risk factor :

Critical / CVSS Base Score : 10.0

Family: Gentoo Local Security Checks

Nessus Plugin ID: 16422 (gentoo_GLSA-200501-31.nasl)

Bugtraq ID:

CVE ID: CVE-2004-0888

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now