teTeX Mkind.C Remote Buffer Overflow Vulnerability
BID:23872
Info
teTeX Mkind.C Remote Buffer Overflow Vulnerability
| Bugtraq ID: | 23872 |
| Class: | Boundary Condition Error |
| CVE: |
CVE-2007-0650 |
| Remote: | Yes |
| Local: | No |
| Published: | May 07 2007 12:00AM |
| Updated: | May 13 2008 01:35AM |
| Credit: | Mark Richters reported this issue. |
| Vulnerable: |
teTeX teTeX 3.0 teTeX teTeX 2.0.2 teTeX teTeX 2.0.1 teTeX teTeX 2.0 teTeX teTeX 1.0.7 teTeX teTeX 1.0.6 pTeX pTeX 3.1.10 Pardus Linux 2007.1 Gentoo Linux |
| Not Vulnerable: | |
Discussion
teTeX Mkind.C Remote Buffer Overflow Vulnerability
teTeX is prone to a buffer-overflow vulnerability because it fails to sufficiently perform boundary checks on user-supplied input before copying it to an insufficiently sized memory buffer.
Remote attackers may exploit this issue by enticing victims into opening a malicious file using the affected application.
Attackers can exploit this issue to execute arbitrary code with the privileges of an unsuspecting user. A successful attack can facilitate the compromise of vulnerable computers. Failed exploit attempts will likely result in denial-of-service conditions.
This issue affects teTeX 2.0.2 and 3.0.0; other versions may also be vulnerable.
teTeX is prone to a buffer-overflow vulnerability because it fails to sufficiently perform boundary checks on user-supplied input before copying it to an insufficiently sized memory buffer.
Remote attackers may exploit this issue by enticing victims into opening a malicious file using the affected application.
Attackers can exploit this issue to execute arbitrary code with the privileges of an unsuspecting user. A successful attack can facilitate the compromise of vulnerable computers. Failed exploit attempts will likely result in denial-of-service conditions.
This issue affects teTeX 2.0.2 and 3.0.0; other versions may also be vulnerable.
Exploit / POC
teTeX Mkind.C Remote Buffer Overflow Vulnerability
Currently we are not aware of any exploits for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Currently we are not aware of any exploits for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution / Fix
teTeX Mkind.C Remote Buffer Overflow Vulnerability
Solution:
Please see the references for more information.
Solution:
Please see the references for more information.
References
teTeX Mkind.C Remote Buffer Overflow Vulnerability
References:
References: