Description: | Summary: The remote host is missing an update for the 'tetex' package(s) announced via the SSA:2006-142-01 advisory.
Vulnerability Insight: New tetex packages are available for Slackware 10.2 and -current to fix a possible security issue. teTeX-3.0 incorporates some code from the xpdf program which has been shown to have various overflows that could result in program crashes or possibly the execution of arbitrary code as the teTeX user. This is especially important to consider if teTeX is being used as part of a printer filter.
More details about this issue may be found in the Common Vulnerabilities and Exposures (CVE) database:
[link moved to references]
Here are the details from the Slackware 10.2 ChangeLog: +--------------------------+ patches/packages/tetex-3.0-i486-2_10.2.tgz: Regenerated the etex.fmt files with etex, not pdfetex. This is more appropriate since etex is a binary, not a link to pdfetex. Thanks to John Breckenridge for reporting the issue. Added --disable-a4, and fixed the texconfig for US paper default in the build script. Thanks to Marc Benstein and Jingmin Zhou for reporting this. Improved /tmp use security. Patched a possible security issue in library code borrowed from xpdf that's used in pdfetex. For more information, see: [link moved to references] (* Security fix *) +--------------------------+
Affected Software/OS: 'tetex' package(s) on Slackware 10.2, Slackware current.
Solution: Please install the updated package(s).
CVSS Score: 5.1
CVSS Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P
|