An issue was discovered in t1_check_unusual_charstring functions in writet1.c files in TeX Live before 2018-09-21. A buffer overflow in the handling of Type 1 fonts allows arbitrary code execution when a malicious font is loaded by one of the vulnerable tools: pdflatex, pdftex, dvips, or luatex.
References
Link | Resource |
---|---|
https://github.com/TeX-Live/texlive-source/commit/6ed0077520e2b0da1fd060c7f88db7b2e6068e4c | Patch Third Party Advisory |
https://lists.debian.org/debian-security-announce/2018/msg00230.html | Mailing List Third Party Advisory |
https://usn.ubuntu.com/3788-1/ | Third Party Advisory |
https://usn.ubuntu.com/3788-2/ | Third Party Advisory |
https://www.debian.org/security/2018/dsa-4299 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
No history.
Information
Published : 2018-09-23 21:29
Updated : 2024-02-04 20:03
NVD link : CVE-2018-17407
Mitre link : CVE-2018-17407
CVE.ORG link : CVE-2018-17407
JSON object : View
Products Affected
tug
- tex_live
debian
- debian_linux
canonical
- ubuntu_linux
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer