|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200501-31] teTeX, pTeX, CSTeX: Multiple vulnerabilities Vulnerability Assessment Details
|
[GLSA-200501-31] teTeX, pTeX, CSTeX: Multiple vulnerabilities |
||
teTeX, pTeX, CSTeX: Multiple vulnerabilities Detailed Explanation for this Vulnerability Assessment The remote host is affected by the vulnerability described in GLSA-200501-31 (teTeX, pTeX, CSTeX: Multiple vulnerabilities) teTeX, pTeX and CSTeX all make use of Xpdf code and may therefore be vulnerable to the various overflows that were discovered in Xpdf code (CVE-2004-0888, CVE-2004-0889, CVE-2004-1125 and CVE-2005-0064). Furthermore, Javier Fernandez-Sanguino Pena discovered that the xdvizilla script does not handle temporary files correctly. Impact A possible hacker could design a malicious input file which, when processed using one of the TeX distributions, could lead to the execution of arbitrary code. Furthermore, a local attacker could create symbolic links in the temporary files directory, pointing to a valid file somewhere on the filesystem. When xdvizilla is called, this would result in the file being overwritten with the rights of the user running the script. Workaround There is no known workaround at this time. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0888 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0889 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1125 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0064 Solution: All teTeX users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=app-text/tetex-2.0.2-r5" All CSTeX users should also upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=app-text/cstetex-2.0.2-r1" Finally, all pTeX users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=app-text/ptex-3.1.4-r2" Network Security Threat Level: Medium Networks Security ID: Vulnerability Assessment Copyright: (C) 2005 Michel Arboi |
||
Cables, Connectors |
VINTAGE APPLE DVD-RAM DRIVE LF-D111A, 678-0197, UNTESTED
$7.95
VINTAGE APPLE II PARALLEL PRINTER CABLE
$6.95
HP 95LX Hewlett Packard Palmtop Computer Lotus 123 Vintage Works - As is
$39.95
VINTAGE APPLECD 600i DRIVE CR-504-C, UNTESTED
$7.95
$79.00
Vintage Apple Macintosh Keyboard M0110A & Mouse M0110 Not Tested/For Parts/Keys
$75.00
VINTAGE APPLE IIE PLATINUM KEYBOARD 658-4094 FOR PARTS OR REPAIR ONLY
$59.95
2 Vintage Collector TOSHIBA Laptop Computer HARD DRIVES 750GB 640GB untested
$9.74
Vintage 70's Diversified Systems Computer CT1600 WD1006V-SR2 SUN02-B JU-475-2
$799.00
Vintage Compaq 5187-5023 PS/2 Multimedia Keyboard model 5185 Working, GC
$16.00
|
||
No Discussions have been posted on this vulnerability. |