All the vulnerabilites related to tug - tetex
cve-2010-0829
Vulnerability from cvelistv5
Published
2010-05-07 17:43
Modified
2024-08-07 00:59
Severity ?
Summary
Multiple array index errors in set.c in dvipng 1.11 and 1.12, and teTeX, allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a malformed DVI file.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T00:59:39.265Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "39914",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/39914"
          },
          {
            "name": "ADV-2010-1219",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2010/1219"
          },
          {
            "name": "FEDORA-2010-8279",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041587.html"
          },
          {
            "name": "SUSE-SR:2010:013",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html"
          },
          {
            "name": "oval:org.mitre.oval:def:9718",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9718"
          },
          {
            "name": "SUSE-SR:2010:012",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html"
          },
          {
            "name": "DSA-2048",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2010/dsa-2048"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=573999"
          },
          {
            "name": "USN-936-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-936-1"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2010-05-06T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple array index errors in set.c in dvipng 1.11 and 1.12, and teTeX, allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a malformed DVI file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-18T12:57:01",
        "orgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc",
        "shortName": "canonical"
      },
      "references": [
        {
          "name": "39914",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/39914"
        },
        {
          "name": "ADV-2010-1219",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2010/1219"
        },
        {
          "name": "FEDORA-2010-8279",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041587.html"
        },
        {
          "name": "SUSE-SR:2010:013",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html"
        },
        {
          "name": "oval:org.mitre.oval:def:9718",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9718"
        },
        {
          "name": "SUSE-SR:2010:012",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html"
        },
        {
          "name": "DSA-2048",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2010/dsa-2048"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=573999"
        },
        {
          "name": "USN-936-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-936-1"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@ubuntu.com",
          "ID": "CVE-2010-0829",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple array index errors in set.c in dvipng 1.11 and 1.12, and teTeX, allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a malformed DVI file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "39914",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/39914"
            },
            {
              "name": "ADV-2010-1219",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2010/1219"
            },
            {
              "name": "FEDORA-2010-8279",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041587.html"
            },
            {
              "name": "SUSE-SR:2010:013",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html"
            },
            {
              "name": "oval:org.mitre.oval:def:9718",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9718"
            },
            {
              "name": "SUSE-SR:2010:012",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html"
            },
            {
              "name": "DSA-2048",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2010/dsa-2048"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=573999",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=573999"
            },
            {
              "name": "USN-936-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-936-1"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc",
    "assignerShortName": "canonical",
    "cveId": "CVE-2010-0829",
    "datePublished": "2010-05-07T17:43:00",
    "dateReserved": "2010-03-03T00:00:00",
    "dateUpdated": "2024-08-07T00:59:39.265Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2010-2642
Vulnerability from cvelistv5
Published
2011-01-07 18:00
Modified
2024-08-07 02:39
Severity ?
Summary
Heap-based buffer overflow in the AFM font parser in the dvi-backend component in Evince 2.32 and earlier, teTeX 3.0, t1lib 5.1.2, and possibly other products allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font in conjunction with a DVI file that is processed by the thumbnailer.
References
http://lists.mandriva.com/security-announce/2011-01/msg00006.phpvendor-advisory, x_refsource_MANDRIVA
http://www.mandriva.com/security/advisories?name=MDVSA-2011:016vendor-advisory, x_refsource_MANDRIVA
http://secunia.com/advisories/42872third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2011/0043vdb-entry, x_refsource_VUPEN
http://www.vupen.com/english/advisories/2011/0029vdb-entry, x_refsource_VUPEN
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052995.htmlvendor-advisory, x_refsource_FEDORA
http://secunia.com/advisories/42769third-party-advisory, x_refsource_SECUNIA
http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.htmlvendor-advisory, x_refsource_SUSE
http://rhn.redhat.com/errata/RHSA-2012-1201.htmlvendor-advisory, x_refsource_REDHAT
http://www.vupen.com/english/advisories/2011/0097vdb-entry, x_refsource_VUPEN
http://www.vupen.com/english/advisories/2011/0193vdb-entry, x_refsource_VUPEN
http://www.debian.org/security/2011/dsa-2357vendor-advisory, x_refsource_DEBIAN
http://www.ubuntu.com/usn/USN-1035-1vendor-advisory, x_refsource_UBUNTU
http://www.mandriva.com/security/advisories?name=MDVSA-2011:017vendor-advisory, x_refsource_MANDRIVA
http://www.vupen.com/english/advisories/2011/0102vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/42821third-party-advisory, x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDVSA-2012:144vendor-advisory, x_refsource_MANDRIVA
http://www.vupen.com/english/advisories/2011/0056vdb-entry, x_refsource_VUPEN
https://bugzilla.redhat.com/show_bug.cgi?id=666318x_refsource_CONFIRM
http://www.redhat.com/support/errata/RHSA-2011-0009.htmlvendor-advisory, x_refsource_REDHAT
http://git.gnome.org/browse/evince/commit/?id=d4139205b010ed06310d14284e63114e88ec6de2x_refsource_CONFIRM
http://www.securitytracker.com/id?1024937vdb-entry, x_refsource_SECTRACK
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052910.htmlvendor-advisory, x_refsource_FEDORA
http://www.securityfocus.com/bid/45678vdb-entry, x_refsource_BID
https://security.gentoo.org/glsa/201701-57vendor-advisory, x_refsource_GENTOO
http://secunia.com/advisories/42847third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2011/0194vdb-entry, x_refsource_VUPEN
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T02:39:37.982Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "MDVSA-2011:005",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://lists.mandriva.com/security-announce/2011-01/msg00006.php"
          },
          {
            "name": "MDVSA-2011:016",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:016"
          },
          {
            "name": "42872",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/42872"
          },
          {
            "name": "ADV-2011-0043",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0043"
          },
          {
            "name": "ADV-2011-0029",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0029"
          },
          {
            "name": "FEDORA-2011-0224",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052995.html"
          },
          {
            "name": "42769",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/42769"
          },
          {
            "name": "SUSE-SR:2011:005",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html"
          },
          {
            "name": "RHSA-2012:1201",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2012-1201.html"
          },
          {
            "name": "ADV-2011-0097",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0097"
          },
          {
            "name": "ADV-2011-0193",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0193"
          },
          {
            "name": "DSA-2357",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2011/dsa-2357"
          },
          {
            "name": "USN-1035-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1035-1"
          },
          {
            "name": "MDVSA-2011:017",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:017"
          },
          {
            "name": "ADV-2011-0102",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0102"
          },
          {
            "name": "42821",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/42821"
          },
          {
            "name": "MDVSA-2012:144",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:144"
          },
          {
            "name": "ADV-2011-0056",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0056"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=666318"
          },
          {
            "name": "RHSA-2011:0009",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2011-0009.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.gnome.org/browse/evince/commit/?id=d4139205b010ed06310d14284e63114e88ec6de2"
          },
          {
            "name": "1024937",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1024937"
          },
          {
            "name": "FEDORA-2011-0208",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052910.html"
          },
          {
            "name": "45678",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/45678"
          },
          {
            "name": "GLSA-201701-57",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/201701-57"
          },
          {
            "name": "42847",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/42847"
          },
          {
            "name": "ADV-2011-0194",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0194"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-01-05T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Heap-based buffer overflow in the AFM font parser in the dvi-backend component in Evince 2.32 and earlier, teTeX 3.0, t1lib 5.1.2, and possibly other products allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font in conjunction with a DVI file that is processed by the thumbnailer."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-06-30T16:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "MDVSA-2011:005",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://lists.mandriva.com/security-announce/2011-01/msg00006.php"
        },
        {
          "name": "MDVSA-2011:016",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:016"
        },
        {
          "name": "42872",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/42872"
        },
        {
          "name": "ADV-2011-0043",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0043"
        },
        {
          "name": "ADV-2011-0029",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0029"
        },
        {
          "name": "FEDORA-2011-0224",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052995.html"
        },
        {
          "name": "42769",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/42769"
        },
        {
          "name": "SUSE-SR:2011:005",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html"
        },
        {
          "name": "RHSA-2012:1201",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2012-1201.html"
        },
        {
          "name": "ADV-2011-0097",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0097"
        },
        {
          "name": "ADV-2011-0193",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0193"
        },
        {
          "name": "DSA-2357",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2011/dsa-2357"
        },
        {
          "name": "USN-1035-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1035-1"
        },
        {
          "name": "MDVSA-2011:017",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:017"
        },
        {
          "name": "ADV-2011-0102",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0102"
        },
        {
          "name": "42821",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/42821"
        },
        {
          "name": "MDVSA-2012:144",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:144"
        },
        {
          "name": "ADV-2011-0056",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0056"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=666318"
        },
        {
          "name": "RHSA-2011:0009",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2011-0009.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.gnome.org/browse/evince/commit/?id=d4139205b010ed06310d14284e63114e88ec6de2"
        },
        {
          "name": "1024937",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1024937"
        },
        {
          "name": "FEDORA-2011-0208",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052910.html"
        },
        {
          "name": "45678",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/45678"
        },
        {
          "name": "GLSA-201701-57",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/201701-57"
        },
        {
          "name": "42847",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/42847"
        },
        {
          "name": "ADV-2011-0194",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0194"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-2642",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Heap-based buffer overflow in the AFM font parser in the dvi-backend component in Evince 2.32 and earlier, teTeX 3.0, t1lib 5.1.2, and possibly other products allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font in conjunction with a DVI file that is processed by the thumbnailer."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "MDVSA-2011:005",
              "refsource": "MANDRIVA",
              "url": "http://lists.mandriva.com/security-announce/2011-01/msg00006.php"
            },
            {
              "name": "MDVSA-2011:016",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:016"
            },
            {
              "name": "42872",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/42872"
            },
            {
              "name": "ADV-2011-0043",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0043"
            },
            {
              "name": "ADV-2011-0029",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0029"
            },
            {
              "name": "FEDORA-2011-0224",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052995.html"
            },
            {
              "name": "42769",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/42769"
            },
            {
              "name": "SUSE-SR:2011:005",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html"
            },
            {
              "name": "RHSA-2012:1201",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2012-1201.html"
            },
            {
              "name": "ADV-2011-0097",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0097"
            },
            {
              "name": "ADV-2011-0193",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0193"
            },
            {
              "name": "DSA-2357",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2011/dsa-2357"
            },
            {
              "name": "USN-1035-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1035-1"
            },
            {
              "name": "MDVSA-2011:017",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:017"
            },
            {
              "name": "ADV-2011-0102",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0102"
            },
            {
              "name": "42821",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/42821"
            },
            {
              "name": "MDVSA-2012:144",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:144"
            },
            {
              "name": "ADV-2011-0056",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0056"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=666318",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=666318"
            },
            {
              "name": "RHSA-2011:0009",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2011-0009.html"
            },
            {
              "name": "http://git.gnome.org/browse/evince/commit/?id=d4139205b010ed06310d14284e63114e88ec6de2",
              "refsource": "CONFIRM",
              "url": "http://git.gnome.org/browse/evince/commit/?id=d4139205b010ed06310d14284e63114e88ec6de2"
            },
            {
              "name": "1024937",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1024937"
            },
            {
              "name": "FEDORA-2011-0208",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052910.html"
            },
            {
              "name": "45678",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/45678"
            },
            {
              "name": "GLSA-201701-57",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/201701-57"
            },
            {
              "name": "42847",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/42847"
            },
            {
              "name": "ADV-2011-0194",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0194"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-2642",
    "datePublished": "2011-01-07T18:00:00",
    "dateReserved": "2010-07-06T00:00:00",
    "dateUpdated": "2024-08-07T02:39:37.982Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2010-0827
Vulnerability from cvelistv5
Published
2010-05-07 17:43
Modified
2024-08-07 00:59
Severity ?
Summary
Integer overflow in dvips in TeX Live 2009 and earlier, and teTeX, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted virtual font (VF) file associated with a DVI file.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T00:59:39.284Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.tug.org/svn/texlive/trunk/Build/source/texk/dvipsk/ChangeLog?view=log"
          },
          {
            "name": "39971",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/39971"
          },
          {
            "name": "GLSA-201206-28",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-201206-28.xml"
          },
          {
            "name": "SUSE-SR:2010:013",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.tug.org/svn/texlive/trunk/Build/source/texk/dvipsk/ChangeLog?r1=18009\u0026r2=18095"
          },
          {
            "name": "SUSE-SR:2010:012",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://security-tracker.debian.org/tracker/CVE-2010-0827"
          },
          {
            "name": "oval:org.mitre.oval:def:10052",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10052"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=572914"
          },
          {
            "name": "USN-937-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-937-1"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2010-04-22T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Integer overflow in dvips in TeX Live 2009 and earlier, and teTeX, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted virtual font (VF) file associated with a DVI file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-18T12:57:01",
        "orgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc",
        "shortName": "canonical"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.tug.org/svn/texlive/trunk/Build/source/texk/dvipsk/ChangeLog?view=log"
        },
        {
          "name": "39971",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/39971"
        },
        {
          "name": "GLSA-201206-28",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-201206-28.xml"
        },
        {
          "name": "SUSE-SR:2010:013",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.tug.org/svn/texlive/trunk/Build/source/texk/dvipsk/ChangeLog?r1=18009\u0026r2=18095"
        },
        {
          "name": "SUSE-SR:2010:012",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://security-tracker.debian.org/tracker/CVE-2010-0827"
        },
        {
          "name": "oval:org.mitre.oval:def:10052",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10052"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=572914"
        },
        {
          "name": "USN-937-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-937-1"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@ubuntu.com",
          "ID": "CVE-2010-0827",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Integer overflow in dvips in TeX Live 2009 and earlier, and teTeX, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted virtual font (VF) file associated with a DVI file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.tug.org/svn/texlive/trunk/Build/source/texk/dvipsk/ChangeLog?view=log",
              "refsource": "CONFIRM",
              "url": "http://www.tug.org/svn/texlive/trunk/Build/source/texk/dvipsk/ChangeLog?view=log"
            },
            {
              "name": "39971",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/39971"
            },
            {
              "name": "GLSA-201206-28",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-201206-28.xml"
            },
            {
              "name": "SUSE-SR:2010:013",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html"
            },
            {
              "name": "http://www.tug.org/svn/texlive/trunk/Build/source/texk/dvipsk/ChangeLog?r1=18009\u0026r2=18095",
              "refsource": "CONFIRM",
              "url": "http://www.tug.org/svn/texlive/trunk/Build/source/texk/dvipsk/ChangeLog?r1=18009\u0026r2=18095"
            },
            {
              "name": "SUSE-SR:2010:012",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html"
            },
            {
              "name": "http://security-tracker.debian.org/tracker/CVE-2010-0827",
              "refsource": "CONFIRM",
              "url": "http://security-tracker.debian.org/tracker/CVE-2010-0827"
            },
            {
              "name": "oval:org.mitre.oval:def:10052",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10052"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=572914",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=572914"
            },
            {
              "name": "USN-937-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-937-1"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc",
    "assignerShortName": "canonical",
    "cveId": "CVE-2010-0827",
    "datePublished": "2010-05-07T17:43:00",
    "dateReserved": "2010-03-03T00:00:00",
    "dateUpdated": "2024-08-07T00:59:39.284Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2010-0739
Vulnerability from cvelistv5
Published
2010-04-16 18:00
Modified
2024-08-07 00:59
Severity ?
Summary
Integer overflow in the predospecial function in dospecial.c in dvips in (1) TeX Live and (2) teTeX might allow user-assisted remote attackers to execute arbitrary code via a crafted DVI file that triggers a heap-based buffer overflow. NOTE: some of these details are obtained from third party information.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T00:59:39.028Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "39500",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/39500"
          },
          {
            "name": "GLSA-201206-28",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-201206-28.xml"
          },
          {
            "name": "oval:org.mitre.oval:def:11468",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11468"
          },
          {
            "name": "SUSE-SR:2010:013",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html"
          },
          {
            "name": "SUSE-SR:2010:012",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html"
          },
          {
            "name": "FEDORA-2010-8273",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041573.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-stable.git%3Ba=blob%3Bf=source/xapps-extra/tetex/texlive-CVE-2010-0739-int-overflow.patch"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=572941"
          },
          {
            "name": "USN-937-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-937-1"
          },
          {
            "name": "39390",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/39390"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2010-04-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Integer overflow in the predospecial function in dospecial.c in dvips in (1) TeX Live and (2) teTeX might allow user-assisted remote attackers to execute arbitrary code via a crafted DVI file that triggers a heap-based buffer overflow.  NOTE: some of these details are obtained from third party information."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-18T12:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "39500",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/39500"
        },
        {
          "name": "GLSA-201206-28",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-201206-28.xml"
        },
        {
          "name": "oval:org.mitre.oval:def:11468",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11468"
        },
        {
          "name": "SUSE-SR:2010:013",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html"
        },
        {
          "name": "SUSE-SR:2010:012",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html"
        },
        {
          "name": "FEDORA-2010-8273",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041573.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-stable.git%3Ba=blob%3Bf=source/xapps-extra/tetex/texlive-CVE-2010-0739-int-overflow.patch"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=572941"
        },
        {
          "name": "USN-937-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-937-1"
        },
        {
          "name": "39390",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/39390"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2010-0739",
    "datePublished": "2010-04-16T18:00:00",
    "dateReserved": "2010-02-26T00:00:00",
    "dateUpdated": "2024-08-07T00:59:39.028Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2010-1440
Vulnerability from cvelistv5
Published
2010-05-07 17:43
Modified
2024-08-07 01:21
Severity ?
Summary
Multiple integer overflows in dvipsk/dospecial.c in dvips in TeX Live 2009 and earlier, and teTeX, allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a special command in a DVI file, related to the (1) predospecial and (2) bbdospecial functions, a different vulnerability than CVE-2010-0739.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T01:21:19.046Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "GLSA-201206-28",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-201206-28.xml"
          },
          {
            "name": "SUSE-SR:2010:013",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=586819"
          },
          {
            "name": "SUSE-SR:2010:012",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html"
          },
          {
            "name": "FEDORA-2010-8273",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041573.html"
          },
          {
            "name": "oval:org.mitre.oval:def:10068",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10068"
          },
          {
            "name": "USN-937-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-937-1"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2010-05-06T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple integer overflows in dvipsk/dospecial.c in dvips in TeX Live 2009 and earlier, and teTeX, allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a special command in a DVI file, related to the (1) predospecial and (2) bbdospecial functions, a different vulnerability than CVE-2010-0739."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-18T12:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "GLSA-201206-28",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-201206-28.xml"
        },
        {
          "name": "SUSE-SR:2010:013",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=586819"
        },
        {
          "name": "SUSE-SR:2010:012",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html"
        },
        {
          "name": "FEDORA-2010-8273",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041573.html"
        },
        {
          "name": "oval:org.mitre.oval:def:10068",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10068"
        },
        {
          "name": "USN-937-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-937-1"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2010-1440",
    "datePublished": "2010-05-07T17:43:00",
    "dateReserved": "2010-04-15T00:00:00",
    "dateUpdated": "2024-08-07T01:21:19.046Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2010-05-07 18:24
Modified
2024-11-21 01:13
Severity ?
Summary
Integer overflow in dvips in TeX Live 2009 and earlier, and teTeX, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted virtual font (VF) file associated with a DVI file.
References
security@ubuntu.comhttp://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html
security@ubuntu.comhttp://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html
security@ubuntu.comhttp://security-tracker.debian.org/tracker/CVE-2010-0827
security@ubuntu.comhttp://security.gentoo.org/glsa/glsa-201206-28.xml
security@ubuntu.comhttp://www.securityfocus.com/bid/39971
security@ubuntu.comhttp://www.tug.org/svn/texlive/trunk/Build/source/texk/dvipsk/ChangeLog?r1=18009&r2=18095
security@ubuntu.comhttp://www.tug.org/svn/texlive/trunk/Build/source/texk/dvipsk/ChangeLog?view=log
security@ubuntu.comhttp://www.ubuntu.com/usn/USN-937-1
security@ubuntu.comhttps://bugzilla.redhat.com/show_bug.cgi?id=572914
security@ubuntu.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10052
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html
af854a3a-2127-422b-91ae-364da2661108http://security-tracker.debian.org/tracker/CVE-2010-0827
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-201206-28.xml
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/39971
af854a3a-2127-422b-91ae-364da2661108http://www.tug.org/svn/texlive/trunk/Build/source/texk/dvipsk/ChangeLog?r1=18009&r2=18095
af854a3a-2127-422b-91ae-364da2661108http://www.tug.org/svn/texlive/trunk/Build/source/texk/dvipsk/ChangeLog?view=log
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-937-1
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=572914
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10052
Impacted products
Vendor Product Version
tug tex_live *
tug tex_live 1996
tug tex_live 1998
tug tex_live 1999
tug tex_live 2000
tug tex_live 2001
tug tex_live 2002
tug tex_live 2003
tug tex_live 2004
tug tex_live 2005
tug tex_live 2007
tug tex_live 2008
tug tetex *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:tug:tex_live:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "388E0684-BFD7-4A30-8AC2-42EDC85955BB",
              "versionEndIncluding": "2009",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tug:tex_live:1996:*:*:*:*:*:*:*",
              "matchCriteriaId": "1886321C-ACDD-476E-8311-6B82E15ADE30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tug:tex_live:1998:*:*:*:*:*:*:*",
              "matchCriteriaId": "D36BA107-EC67-4834-8018-3EAA5392A256",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tug:tex_live:1999:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C238BF-91CF-46E5-97AA-6A53280C26D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tug:tex_live:2000:*:*:*:*:*:*:*",
              "matchCriteriaId": "053D41D8-701B-4822-9022-759D8EBA5A96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tug:tex_live:2001:*:*:*:*:*:*:*",
              "matchCriteriaId": "C283B085-0A4B-43F2-B308-68D317E5648C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tug:tex_live:2002:*:*:*:*:*:*:*",
              "matchCriteriaId": "18EA31BF-D186-400D-895D-773E6382B03A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tug:tex_live:2003:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B1936F4-CC35-45BE-9EDC-698B64C5E2F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tug:tex_live:2004:*:*:*:*:*:*:*",
              "matchCriteriaId": "41E85464-9235-4633-AFCA-5A7359439572",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tug:tex_live:2005:*:*:*:*:*:*:*",
              "matchCriteriaId": "18CE2C23-2A1E-41BB-A8BF-5E151B7BF45F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tug:tex_live:2007:*:*:*:*:*:*:*",
              "matchCriteriaId": "87B6A525-428C-4A0C-994A-DE95B138A437",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tug:tex_live:2008:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D24333B-8305-4EEA-8DA5-240E773EF5FD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:tug:tetex:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EA161A0-1486-4209-8463-448ABE2576D4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Integer overflow in dvips in TeX Live 2009 and earlier, and teTeX, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted virtual font (VF) file associated with a DVI file."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de entero en dvips en TeX Live 2009 y anteriores, y teTeX, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda de aplicaci\u00f3n) o posiblemente ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de una fuente virtual manipulada, asociada a un fichero DVI."
    }
  ],
  "id": "CVE-2010-0827",
  "lastModified": "2024-11-21T01:13:02.307",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2010-05-07T18:24:15.610",
  "references": [
    {
      "source": "security@ubuntu.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html"
    },
    {
      "source": "security@ubuntu.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html"
    },
    {
      "source": "security@ubuntu.com",
      "url": "http://security-tracker.debian.org/tracker/CVE-2010-0827"
    },
    {
      "source": "security@ubuntu.com",
      "url": "http://security.gentoo.org/glsa/glsa-201206-28.xml"
    },
    {
      "source": "security@ubuntu.com",
      "url": "http://www.securityfocus.com/bid/39971"
    },
    {
      "source": "security@ubuntu.com",
      "url": "http://www.tug.org/svn/texlive/trunk/Build/source/texk/dvipsk/ChangeLog?r1=18009\u0026r2=18095"
    },
    {
      "source": "security@ubuntu.com",
      "url": "http://www.tug.org/svn/texlive/trunk/Build/source/texk/dvipsk/ChangeLog?view=log"
    },
    {
      "source": "security@ubuntu.com",
      "url": "http://www.ubuntu.com/usn/USN-937-1"
    },
    {
      "source": "security@ubuntu.com",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=572914"
    },
    {
      "source": "security@ubuntu.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10052"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security-tracker.debian.org/tracker/CVE-2010-0827"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-201206-28.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/39971"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.tug.org/svn/texlive/trunk/Build/source/texk/dvipsk/ChangeLog?r1=18009\u0026r2=18095"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.tug.org/svn/texlive/trunk/Build/source/texk/dvipsk/ChangeLog?view=log"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-937-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=572914"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10052"
    }
  ],
  "sourceIdentifier": "security@ubuntu.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-189"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2010-05-07 18:24
Modified
2024-11-21 01:13
Severity ?
Summary
Multiple array index errors in set.c in dvipng 1.11 and 1.12, and teTeX, allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a malformed DVI file.
References
security@ubuntu.comhttp://lists.fedoraproject.org/pipermail/package-announce/2010-May/041587.html
security@ubuntu.comhttp://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html
security@ubuntu.comhttp://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html
security@ubuntu.comhttp://secunia.com/advisories/39914
security@ubuntu.comhttp://www.debian.org/security/2010/dsa-2048
security@ubuntu.comhttp://www.ubuntu.com/usn/USN-936-1
security@ubuntu.comhttp://www.vupen.com/english/advisories/2010/1219
security@ubuntu.comhttps://bugzilla.redhat.com/show_bug.cgi?id=573999Patch
security@ubuntu.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9718
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041587.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/39914
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2010/dsa-2048
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-936-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2010/1219
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=573999Patch
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9718
Impacted products
Vendor Product Version
jan-ake_larsson dvipng 1.11
jan-ake_larsson dvipng 1.12
tug tetex *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:jan-ake_larsson:dvipng:1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "55AF72CB-8D41-45CB-8B38-5AC8F34B19AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:jan-ake_larsson:dvipng:1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "41008A2A-1E30-4667-8608-176C29C6E7CE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:tug:tetex:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EA161A0-1486-4209-8463-448ABE2576D4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple array index errors in set.c in dvipng 1.11 and 1.12, and teTeX, allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a malformed DVI file."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples errores de \u00edndice de tabla en set.c en dvipng v1.11 y v1.12, y teTeX, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda de aplicaci\u00f3n) o posiblemente ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de una fichero DVI mal formado."
    }
  ],
  "id": "CVE-2010-0829",
  "lastModified": "2024-11-21T01:13:02.527",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2010-05-07T18:24:15.657",
  "references": [
    {
      "source": "security@ubuntu.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041587.html"
    },
    {
      "source": "security@ubuntu.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html"
    },
    {
      "source": "security@ubuntu.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html"
    },
    {
      "source": "security@ubuntu.com",
      "url": "http://secunia.com/advisories/39914"
    },
    {
      "source": "security@ubuntu.com",
      "url": "http://www.debian.org/security/2010/dsa-2048"
    },
    {
      "source": "security@ubuntu.com",
      "url": "http://www.ubuntu.com/usn/USN-936-1"
    },
    {
      "source": "security@ubuntu.com",
      "url": "http://www.vupen.com/english/advisories/2010/1219"
    },
    {
      "source": "security@ubuntu.com",
      "tags": [
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=573999"
    },
    {
      "source": "security@ubuntu.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9718"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041587.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/39914"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2010/dsa-2048"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-936-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2010/1219"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=573999"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9718"
    }
  ],
  "sourceIdentifier": "security@ubuntu.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2010-04-16 18:30
Modified
2024-11-21 01:12
Severity ?
Summary
Integer overflow in the predospecial function in dospecial.c in dvips in (1) TeX Live and (2) teTeX might allow user-assisted remote attackers to execute arbitrary code via a crafted DVI file that triggers a heap-based buffer overflow. NOTE: some of these details are obtained from third party information.
References
secalert@redhat.comhttp://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-stable.git%3Ba=blob%3Bf=source/xapps-extra/tetex/texlive-CVE-2010-0739-int-overflow.patch
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2010-May/041573.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html
secalert@redhat.comhttp://secunia.com/advisories/39390Vendor Advisory
secalert@redhat.comhttp://security.gentoo.org/glsa/glsa-201206-28.xml
secalert@redhat.comhttp://www.securityfocus.com/bid/39500
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-937-1
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=572941
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11468
af854a3a-2127-422b-91ae-364da2661108http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-stable.git%3Ba=blob%3Bf=source/xapps-extra/tetex/texlive-CVE-2010-0739-int-overflow.patch
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041573.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/39390Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-201206-28.xml
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/39500
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-937-1
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=572941
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11468
Impacted products
Vendor Product Version
tug tetex *
tug tex_live *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:tug:tetex:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EA161A0-1486-4209-8463-448ABE2576D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tug:tex_live:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A889978C-C91D-4638-8AD5-CFF7AA51BB43",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Integer overflow in the predospecial function in dospecial.c in dvips in (1) TeX Live and (2) teTeX might allow user-assisted remote attackers to execute arbitrary code via a crafted DVI file that triggers a heap-based buffer overflow.  NOTE: some of these details are obtained from third party information."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de enteros en la funci\u00f3n predospecial en dospecial.c en dvips en (1) TeX Live y (2) teTeX puede permitir a atacantes asistidos por usuarios ejecutar c\u00f3digo a trav\u00e9s de un fichero DVI manipulado que lanza un desbordamiento de b\u00fafer basado en pila. NOTA: algunos de estos detalles han sido obtenidos a partir de terceros."
    }
  ],
  "id": "CVE-2010-0739",
  "lastModified": "2024-11-21T01:12:51.740",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2010-04-16T18:30:00.383",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-stable.git%3Ba=blob%3Bf=source/xapps-extra/tetex/texlive-CVE-2010-0739-int-overflow.patch"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041573.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/39390"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://security.gentoo.org/glsa/glsa-201206-28.xml"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/39500"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/USN-937-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=572941"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11468"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.frugalware.org/gitweb/gitweb.cgi?p=frugalware-stable.git%3Ba=blob%3Bf=source/xapps-extra/tetex/texlive-CVE-2010-0739-int-overflow.patch"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041573.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/39390"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-201206-28.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/39500"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-937-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=572941"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11468"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-189"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-01-07 19:00
Modified
2024-11-21 01:17
Severity ?
Summary
Heap-based buffer overflow in the AFM font parser in the dvi-backend component in Evince 2.32 and earlier, teTeX 3.0, t1lib 5.1.2, and possibly other products allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font in conjunction with a DVI file that is processed by the thumbnailer.
References
cve@mitre.orghttp://git.gnome.org/browse/evince/commit/?id=d4139205b010ed06310d14284e63114e88ec6de2Patch
cve@mitre.orghttp://lists.fedoraproject.org/pipermail/package-announce/2011-January/052910.html
cve@mitre.orghttp://lists.fedoraproject.org/pipermail/package-announce/2011-January/052995.html
cve@mitre.orghttp://lists.mandriva.com/security-announce/2011-01/msg00006.php
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2012-1201.html
cve@mitre.orghttp://secunia.com/advisories/42769Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/42821Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/42847Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/42872
cve@mitre.orghttp://www.debian.org/security/2011/dsa-2357
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2011:016
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2011:017
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2012:144
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2011-0009.html
cve@mitre.orghttp://www.securityfocus.com/bid/45678
cve@mitre.orghttp://www.securitytracker.com/id?1024937
cve@mitre.orghttp://www.ubuntu.com/usn/USN-1035-1
cve@mitre.orghttp://www.vupen.com/english/advisories/2011/0029Vendor Advisory
cve@mitre.orghttp://www.vupen.com/english/advisories/2011/0043Vendor Advisory
cve@mitre.orghttp://www.vupen.com/english/advisories/2011/0056
cve@mitre.orghttp://www.vupen.com/english/advisories/2011/0097
cve@mitre.orghttp://www.vupen.com/english/advisories/2011/0102
cve@mitre.orghttp://www.vupen.com/english/advisories/2011/0193
cve@mitre.orghttp://www.vupen.com/english/advisories/2011/0194
cve@mitre.orghttps://bugzilla.redhat.com/show_bug.cgi?id=666318Patch
cve@mitre.orghttps://security.gentoo.org/glsa/201701-57
af854a3a-2127-422b-91ae-364da2661108http://git.gnome.org/browse/evince/commit/?id=d4139205b010ed06310d14284e63114e88ec6de2Patch
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052910.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052995.html
af854a3a-2127-422b-91ae-364da2661108http://lists.mandriva.com/security-announce/2011-01/msg00006.php
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2012-1201.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/42769Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/42821Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/42847Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/42872
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2011/dsa-2357
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2011:016
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2011:017
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2012:144
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2011-0009.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/45678
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1024937
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1035-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0029Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0043Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0056
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0097
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0102
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0193
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0194
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=666318Patch
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/201701-57
Impacted products
Vendor Product Version
redhat evince *
redhat evince 0.1
redhat evince 0.2
redhat evince 0.3
redhat evince 0.4
redhat evince 0.5
redhat evince 0.6
redhat evince 0.7
redhat evince 0.8
redhat evince 0.9
redhat evince 2.19
redhat evince 2.20
redhat evince 2.21
redhat evince 2.22
redhat evince 2.23
redhat evince 2.24
redhat evince 2.25
redhat evince 2.26
redhat evince 2.27
redhat evince 2.28
redhat evince 2.29
redhat evince 2.29.92
redhat evince 2.30
redhat evince 2.30.2
redhat evince 2.30.3
redhat evince 2.31
redhat evince 2.31.1
redhat evince 2.31.2
redhat evince 2.31.4
redhat evince 2.31.4.1
redhat evince 2.31.6
redhat evince 2.31.6.1
redhat evince 2.31.90
redhat evince 2.31.92
t1lib t1lib 5.1.2
tug tetex 3.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:redhat:evince:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "20283624-F068-45D0-ABCF-F02BAD8105FB",
              "versionEndIncluding": "2.32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:evince:0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2C4D8E2-B5D1-4229-8C4E-A5D3D45CE232",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:evince:0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9B61463-DAAD-42B9-A9E4-7D5C0FC94A26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:evince:0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "682240C5-7830-45AC-A8E8-F012519E3BB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:evince:0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "9299EE95-FB9F-40A3-ACBA-9F8675D04314",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:evince:0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C9D303A-590D-4D6E-A76E-ED05F5CA3A68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:evince:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "06F244EC-8257-4B41-8CE1-0BE3F81C6F3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:evince:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "774E0BE3-5F1F-4C39-9ED2-35E1A0FDE845",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:evince:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D2EC73E-7AAF-4524-ABA7-5236F1FBD2C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:evince:0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B271944-EAC3-4E79-95BB-58FA1E7EB26B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:evince:2.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "47E24A04-E690-4F80-B0F6-7166B01B732A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:evince:2.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "47173787-5BD5-4131-A8CD-0D00D1187C41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:evince:2.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6508CBF-FC04-441D-9D86-955E6FAA0296",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:evince:2.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD94C302-7E99-4F0D-B6CA-9D59120DE5D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:evince:2.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "750B45E1-7D9D-45BE-8B0B-A5B7045DE309",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:evince:2.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E840F13-F8BC-4A99-9404-94E2292F02BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:evince:2.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EEFEFB1-A14F-4100-A4AD-0B28E6A2B84D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:evince:2.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CACCB74-DE05-4619-8E69-38686FFE9BB8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:evince:2.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E72F3DA-2BA2-4D5E-96E4-8DDDBF7200DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:evince:2.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DCCF82E-BFC7-4459-98C2-54754636664B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:evince:2.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CA2BC54-6E75-493D-953D-DC41ADBCFAE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:evince:2.29.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "1660E63C-4CD1-4B43-9A40-0B731FC5C1C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:evince:2.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E3ED013-4381-4996-96D8-C560EB24C173",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:evince:2.30.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "219D9DEE-0720-4871-8DDC-C24F5F6FB056",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:evince:2.30.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "6456E479-7A12-4904-8054-354AC4FC32AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:evince:2.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED7BFBC3-4F4F-4E36-BE99-4E6C4CEE2B2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:evince:2.31.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "62F1AA5A-33FE-4C61-8311-3FE44CE9C04B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:evince:2.31.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0232A03E-43BC-4AC3-8175-BD3BAAB842A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:evince:2.31.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAA8CD39-5229-44AF-AC3D-2713E753D782",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:evince:2.31.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8DC7981-BA67-463C-AA67-96F8EE9C6DD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:evince:2.31.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D23AD37-4BBA-4B5B-961F-89AFD892E4C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:evince:2.31.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8783726-03D8-4DBE-8F2A-DC01B29C18F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:evince:2.31.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE5419CF-CC0A-451C-A9CE-4CA811EFDCA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:evince:2.31.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAE1D8FE-395E-4009-B91C-4CC966952837",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:t1lib:t1lib:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1DD1554-BCD4-4D31-ACB2-3788E5CB2407",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tug:tetex:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5143077C-55B7-4D71-A508-4CB4F2BE55A2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Heap-based buffer overflow in the AFM font parser in the dvi-backend component in Evince 2.32 and earlier, teTeX 3.0, t1lib 5.1.2, and possibly other products allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font in conjunction with a DVI file that is processed by the thumbnailer."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer basado en memoria din\u00e1mica en el validador de fuentes AFM (AFM font parser) en el componente dvi-backend de Evince v2.32 y anteriores, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda de la aplicaci\u00f3n) o puede que ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de una fuente manipulada junto con un fichero DVI que es procesado por el thumbnailer."
    }
  ],
  "id": "CVE-2010-2642",
  "lastModified": "2024-11-21T01:17:04.383",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.6,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 4.9,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2011-01-07T19:00:17.313",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://git.gnome.org/browse/evince/commit/?id=d4139205b010ed06310d14284e63114e88ec6de2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052910.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052995.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.mandriva.com/security-announce/2011-01/msg00006.php"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://rhn.redhat.com/errata/RHSA-2012-1201.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/42769"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/42821"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/42847"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/42872"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2011/dsa-2357"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:016"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:017"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:144"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2011-0009.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/45678"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1024937"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/USN-1035-1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0029"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0043"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2011/0056"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2011/0097"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2011/0102"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2011/0193"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2011/0194"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=666318"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://security.gentoo.org/glsa/201701-57"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://git.gnome.org/browse/evince/commit/?id=d4139205b010ed06310d14284e63114e88ec6de2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052910.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052995.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.mandriva.com/security-announce/2011-01/msg00006.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2012-1201.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/42769"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/42821"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/42847"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/42872"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2011/dsa-2357"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:016"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:017"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:144"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2011-0009.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/45678"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1024937"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1035-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0029"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0043"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2011/0056"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2011/0097"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2011/0102"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2011/0193"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2011/0194"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=666318"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/201701-57"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2010-05-07 18:24
Modified
2024-11-21 01:14
Severity ?
Summary
Multiple integer overflows in dvipsk/dospecial.c in dvips in TeX Live 2009 and earlier, and teTeX, allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a special command in a DVI file, related to the (1) predospecial and (2) bbdospecial functions, a different vulnerability than CVE-2010-0739.
Impacted products
Vendor Product Version
tug tetex *
tug tex_live *
tug tex_live 1996
tug tex_live 1998
tug tex_live 1999
tug tex_live 2000
tug tex_live 2001
tug tex_live 2002
tug tex_live 2003
tug tex_live 2004
tug tex_live 2005
tug tex_live 2007
tug tex_live 2008



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:tug:tetex:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EA161A0-1486-4209-8463-448ABE2576D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tug:tex_live:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "388E0684-BFD7-4A30-8AC2-42EDC85955BB",
              "versionEndIncluding": "2009",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tug:tex_live:1996:*:*:*:*:*:*:*",
              "matchCriteriaId": "1886321C-ACDD-476E-8311-6B82E15ADE30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tug:tex_live:1998:*:*:*:*:*:*:*",
              "matchCriteriaId": "D36BA107-EC67-4834-8018-3EAA5392A256",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tug:tex_live:1999:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C238BF-91CF-46E5-97AA-6A53280C26D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tug:tex_live:2000:*:*:*:*:*:*:*",
              "matchCriteriaId": "053D41D8-701B-4822-9022-759D8EBA5A96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tug:tex_live:2001:*:*:*:*:*:*:*",
              "matchCriteriaId": "C283B085-0A4B-43F2-B308-68D317E5648C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tug:tex_live:2002:*:*:*:*:*:*:*",
              "matchCriteriaId": "18EA31BF-D186-400D-895D-773E6382B03A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tug:tex_live:2003:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B1936F4-CC35-45BE-9EDC-698B64C5E2F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tug:tex_live:2004:*:*:*:*:*:*:*",
              "matchCriteriaId": "41E85464-9235-4633-AFCA-5A7359439572",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tug:tex_live:2005:*:*:*:*:*:*:*",
              "matchCriteriaId": "18CE2C23-2A1E-41BB-A8BF-5E151B7BF45F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tug:tex_live:2007:*:*:*:*:*:*:*",
              "matchCriteriaId": "87B6A525-428C-4A0C-994A-DE95B138A437",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tug:tex_live:2008:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D24333B-8305-4EEA-8DA5-240E773EF5FD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple integer overflows in dvipsk/dospecial.c in dvips in TeX Live 2009 and earlier, and teTeX, allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a special command in a DVI file, related to the (1) predospecial and (2) bbdospecial functions, a different vulnerability than CVE-2010-0739."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples desbordamientos de enteros en dvipsk/dospecial.c en dvips en TeX Live 2009 y anteriores y teTeX, permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda de aplicaci\u00f3n) o posiblemente ejecutar c\u00f3digo arbitrario a trav\u00e9s de un comando especial en un fichero DVI, relativo a las funciones (1) predospecial y (2) bbdospecial, vulnerabilidad diferente a CVE-2010-0739."
    }
  ],
  "id": "CVE-2010-1440",
  "lastModified": "2024-11-21T01:14:26.000",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2010-05-07T18:24:15.877",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041573.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://security.gentoo.org/glsa/glsa-201206-28.xml"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/USN-937-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=586819"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10068"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041573.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-201206-28.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-937-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=586819"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10068"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-189"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}