-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2010:096 http://www.mandriva.com/security/ _______________________________________________________________________ Package : tetex Date : May 17, 2010 Affected: Corporate 4.0 _______________________________________________________________________ Problem Description: Multiple vulnerabilities has been discovered and fixed in tetex: Multiple buffer overflows in the JBIG2 decoder in Xpdf 3.02pl2 and earlier allow remote attackers to cause a denial of service (crash) via a crafted PDF file, related to (1) setBitmap and (2) readSymbolDictSeg (CVE-2009-0146). Multiple integer overflows in the JBIG2 decoder in Xpdf 3.02pl2 and earlier allow remote attackers to cause a denial of service (crash) via a crafted PDF file (CVE-2009-0147). The JBIG2 decoder in Xpdf 3.02pl2 and earlier allows remote attackers to cause a denial of service (crash) via a crafted PDF file that triggers a free of uninitialized memory (CVE-2009-0166). Heap-based buffer overflow in Xpdf 3.02pl2 and earlier, CUPS 1.3.9, and probably other products, allows remote attackers to execute arbitrary code via a PDF file with crafted JBIG2 symbol dictionary segments (CVE-2009-0195). Buffer overflow in BibTeX 0.99 allows context-dependent attackers to cause a denial of service (memory corruption and crash) via a long .bib bibliography file (CVE-2009-1284). Integer overflow in the ObjectStream::ObjectStream function in XRef.cc in Xpdf 3.x before 3.02pl4 and Poppler before 0.12.1, as used in GPdf, kdegraphics KPDF, CUPS pdftops, and teTeX, might allow remote attackers to execute arbitrary code via a crafted PDF document that triggers a heap-based buffer overflow (CVE-2009-3608). Integer overflow in dvips in TeX Live 2009 and earlier, and teTeX, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted virtual font (VF) file associated with a DVI file (CVE-2010-0827). Multiple array index errors in set.c in dvipng 1.11 and 1.12, and teTeX, allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a malformed DVI file (CVE-2010-0829). Integer overflow in the predospecial function in dospecial.c in dvips in (1) TeX Live and (2) teTeX might allow user-assisted remote attackers to execute arbitrary code via a crafted DVI file that triggers a heap-based buffer overflow. NOTE: some of these details are obtained from third party information (CVE-2010-0739). Multiple integer overflows in dvipsk/dospecial.c in dvips in TeX Live 2009 and earlier, and teTeX, allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a special command in a DVI file, related to the (1) predospecial and (2) bbdospecial functions, a different vulnerability than CVE-2010-0739 (CVE-2010-1440). The corrected packages solves these problems. _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0146 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0147 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0166 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0195 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1284 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3608 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0739 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0827 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0829 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1440 _______________________________________________________________________ Updated Packages: Corporate 4.0: 074ab98aef9b6514a200ab9e5883dc4e corporate/4.0/i586/jadetex-3.12-110.8.20060mlcs4.i586.rpm c99ad31c59a43ede5f0802d671d427d9 corporate/4.0/i586/tetex-3.0-12.8.20060mlcs4.i586.rpm 9ff7b44ef3b840461c2db7846a82c2a9 corporate/4.0/i586/tetex-afm-3.0-12.8.20060mlcs4.i586.rpm 8a515142f2a4840f610c2975230c759b corporate/4.0/i586/tetex-context-3.0-12.8.20060mlcs4.i586.rpm 13ebae13d6be32ed040a539220da5205 corporate/4.0/i586/tetex-devel-3.0-12.8.20060mlcs4.i586.rpm d08ca0f7cb17e8f4aaf14159f2847385 corporate/4.0/i586/tetex-doc-3.0-12.8.20060mlcs4.i586.rpm c725bf8aa202b7d4df9f37d662e4cf5e corporate/4.0/i586/tetex-dvilj-3.0-12.8.20060mlcs4.i586.rpm 85e7fce95b930eaa1f299b2709b14139 corporate/4.0/i586/tetex-dvipdfm-3.0-12.8.20060mlcs4.i586.rpm 975dd0fb48045d5f7397f48794f85112 corporate/4.0/i586/tetex-dvips-3.0-12.8.20060mlcs4.i586.rpm 0702447414b6ce056185a429e5b90f2b corporate/4.0/i586/tetex-latex-3.0-12.8.20060mlcs4.i586.rpm 139d0376fe9ccabbb8157d8ce5f220b2 corporate/4.0/i586/tetex-mfwin-3.0-12.8.20060mlcs4.i586.rpm 6ec4a74d89e349ee75da6189da0e29be corporate/4.0/i586/tetex-texi2html-3.0-12.8.20060mlcs4.i586.rpm baa061164ced3207801bc4bd3299d071 corporate/4.0/i586/tetex-xdvi-3.0-12.8.20060mlcs4.i586.rpm c141b482b5edab6e6bc2cef61d613d1d corporate/4.0/i586/xmltex-1.9-58.8.20060mlcs4.i586.rpm 05c3cd1cc81035250a4b68eb18c689e3 corporate/4.0/SRPMS/tetex-3.0-12.8.20060mlcs4.src.rpm Corporate 4.0/X86_64: 78c3d11773d3c899ae205d64a0cec725 corporate/4.0/x86_64/jadetex-3.12-110.8.20060mlcs4.x86_64.rpm 0810065ec01d9aae9743b3ba0eb8d470 corporate/4.0/x86_64/tetex-3.0-12.8.20060mlcs4.x86_64.rpm 4470d4ba12c8db1a74d03be1abbf4348 corporate/4.0/x86_64/tetex-afm-3.0-12.8.20060mlcs4.x86_64.rpm 490861c54ad156a6d6f6a42f8b8598e3 corporate/4.0/x86_64/tetex-context-3.0-12.8.20060mlcs4.x86_64.rpm e3cbef2e16e8ee837bdc3b01d192444b corporate/4.0/x86_64/tetex-devel-3.0-12.8.20060mlcs4.x86_64.rpm bbff7a2edf4a455ac3fedab8d4c803db corporate/4.0/x86_64/tetex-doc-3.0-12.8.20060mlcs4.x86_64.rpm e76a7f7da703d31c6a2066aff6088a36 corporate/4.0/x86_64/tetex-dvilj-3.0-12.8.20060mlcs4.x86_64.rpm 836d4a41a9d7d12955c043730f03139b corporate/4.0/x86_64/tetex-dvipdfm-3.0-12.8.20060mlcs4.x86_64.rpm d94395fb00248263360c413838efc39e corporate/4.0/x86_64/tetex-dvips-3.0-12.8.20060mlcs4.x86_64.rpm f4e5f8d156c62007c2af11049f86ab77 corporate/4.0/x86_64/tetex-latex-3.0-12.8.20060mlcs4.x86_64.rpm a593e40ecbba2320e40116c31d208555 corporate/4.0/x86_64/tetex-mfwin-3.0-12.8.20060mlcs4.x86_64.rpm be8c25178b62320bc8ff913203f43ac5 corporate/4.0/x86_64/tetex-texi2html-3.0-12.8.20060mlcs4.x86_64.rpm 81fcecbb73f775719be8a3af9f5ad185 corporate/4.0/x86_64/tetex-xdvi-3.0-12.8.20060mlcs4.x86_64.rpm 4195facae25d085c978bcc1f388126f4 corporate/4.0/x86_64/xmltex-1.9-58.8.20060mlcs4.x86_64.rpm 05c3cd1cc81035250a4b68eb18c689e3 corporate/4.0/SRPMS/tetex-3.0-12.8.20060mlcs4.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team <security*mandriva.com> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iD8DBQFL8UIhmqjQ0CJFipgRAvafAKCHWV+qiVeXTvUDLtraCyGg1ONAlQCgkOZK gL1RilejPSbpkRlDWrIf81E= =LJew -----END PGP SIGNATURE-----