Buffer overflow in the open_sty function in mkind.c for makeindex 2.14 in teTeX might allow user-assisted remote attackers to overwrite files and possibly execute arbitrary code via a long filename. NOTE: other overflows exist but might not be exploitable, such as a heap-based overflow in the check_idx function.
References
Configurations
History
21 Nov 2024, 00:26
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/26982 - | |
References | () http://secunia.com/advisories/30168 - | |
References | () http://security.gentoo.org/glsa/glsa-200709-17.xml - | |
References | () http://security.gentoo.org/glsa/glsa-200711-34.xml - | |
References | () http://security.gentoo.org/glsa/glsa-200805-13.xml - | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2007:109 - | |
References | () http://www.securityfocus.com/bid/23872 - | |
References | () http://www.vupen.com/english/advisories/2007/1706 - | |
References | () https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=225491 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/32284 - | |
References | () https://issues.rpath.com/browse/RPL-1036 - |
Information
Published : 2007-02-01 19:28
Updated : 2025-04-09 00:30
NVD link : CVE-2007-0650
Mitre link : CVE-2007-0650
CVE.ORG link : CVE-2007-0650
JSON object : View
Products Affected
makeindex
- makeindex
CWE