Rapid7 Vulnerability & Exploit Database

RHSA-2012:1201: tetex security update

Back to Search

RHSA-2012:1201: tetex security update

Severity
8
CVSS
(AV:N/AC:H/Au:N/C:C/I:C/A:C)
Published
01/07/2011
Created
07/25/2018
Added
08/30/2012
Modified
07/04/2017

Description

teTeX is an implementation of TeX. TeX takes a text file and a set offormatting commands as input, and creates a typesetter-independent DeViceIndependent (DVI) file as output.teTeX embeds a copy of t1lib to rasterize bitmaps from PostScript Type 1fonts. The following issues affect t1lib code:Two heap-based buffer overflow flaws were found in the way t1lib processedAdobe Font Metrics (AFM) files. If a specially-crafted font file was openedby teTeX, it could cause teTeX to crash or, potentially, execute arbitrarycode with the privileges of the user running teTeX. (CVE-2010-2642,CVE-2011-0433)An invalid pointer dereference flaw was found in t1lib. A specially-craftedfont file could, when opened, cause teTeX to crash or, potentially, executearbitrary code with the privileges of the user running teTeX.(CVE-2011-0764)A use-after-free flaw was found in t1lib. A specially-crafted font filecould, when opened, cause teTeX to crash or, potentially, execute arbitrarycode with the privileges of the user running teTeX. (CVE-2011-1553)An off-by-one flaw was found in t1lib. A specially-crafted font file could,when opened, cause teTeX to crash or, potentially, execute arbitrary codewith the privileges of the user running teTeX. (CVE-2011-1554)An out-of-bounds memory read flaw was found in t1lib. A specially-craftedfont file could, when opened, cause teTeX to crash. (CVE-2011-1552)teTeX embeds a copy of Xpdf, an open source Portable Document Format (PDF)file viewer, to allow adding images in PDF format to the generated PDFdocuments. The following issues affect Xpdf code:An uninitialized pointer use flaw was discovered in Xpdf. If pdflatex wasused to process a TeX document referencing a specially-crafted PDF file, itcould cause pdflatex to crash or, potentially, execute arbitrary code withthe privileges of the user running pdflatex. (CVE-2010-3702)An array index error was found in the way Xpdf parsed PostScript Type 1fonts embedded in PDF documents. If pdflatex was used to process a TeXdocument referencing a specially-crafted PDF file, it could cause pdflatexto crash or, potentially, execute arbitrary code with the privileges of theuser running pdflatex. (CVE-2010-3704)Red Hat would like to thank the Evince development team for reportingCVE-2010-2642. Upstream acknowledges Jon Larimer of IBM X-Force as theoriginal reporter of CVE-2010-2642.All users of tetex are advised to upgrade to these updated packages, whichcontain backported patches to correct these issues.

Solution(s)

  • redhat-upgrade-tetex
  • redhat-upgrade-tetex-afm
  • redhat-upgrade-tetex-debuginfo
  • redhat-upgrade-tetex-doc
  • redhat-upgrade-tetex-dvips
  • redhat-upgrade-tetex-fonts
  • redhat-upgrade-tetex-latex
  • redhat-upgrade-tetex-xdvi

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;