---------------------------------------------------------------------- 2003: 2,700 advisories published 2004: 3,100 advisories published 2005: 4,600 advisories published 2006: 5,300 advisories published How do you know which Secunia advisories are important to you? The Secunia Vulnerability Intelligence Solutions allows you to filter and structure all the information you need, so you can address issues effectively. Get a free trial of the Secunia Vulnerability Intelligence Solutions: http://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv ---------------------------------------------------------------------- TITLE: teTeX Multiple Vulnerabilities SECUNIA ADVISORY ID: SA27672 VERIFY ADVISORY: http://secunia.com/advisories/27672/ CRITICAL: Less critical IMPACT: Manipulation of data, Exposure of sensitive information, DoS, System access WHERE: >From remote SOFTWARE: teTeX 3.x http://secunia.com/product/6388/ DESCRIPTION: Some vulnerabilities have been reported in teTeX, which can be exploited by malicious, local users to disclose and manipulate sensitive information and by malicious people to potentially compromise a vulnerable system. 1) A boundary error in dvips can be exploited to cause a stack-based buffer overflow when a user is tricked into opening a specially crafted DVI file containing an overly long hypertext reference. Successful exploitation requires that dvips is invoked with the "-z" option. 2) Some boundary errors in dviljk can be exploited to cause buffer overflows when a user is enticed to print a specially crafted DVI file. Successful exploitation of vulnerabilities #1 and #2 may allow execution of arbitrary code. 3) An error due to dvips using the insecure "tmpnam()" function when converting DVI files can potentially be exploited to disclose and modify sensitive information. SOLUTION: Do not process DVI files from untrusted sources. Grant only trusted users access to affected systems. PROVIDED AND/OR DISCOVERED BY: 1) Bastien Roucaries, reported via a Debian bug report. 2, 3) Joachim Schrod ORIGINAL ADVISORY: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=447081 http://bugs.gentoo.org/attachment.cgi?id=135423 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------