[arch-security] [ASA-201605-9] latex2rtf: arbitrary code execution
Remi Gacogne
rgacogne at archlinux.org
Fri May 6 21:47:02 UTC 2016
Arch Linux Security Advisory ASA-201605-9
=========================================
Severity: High
Date : 2016-05-06
CVE-ID : CVE-2015-8106
Package : latex2rtf
Type : arbitrary code execution
Remote : Yes
Link : https://wiki.archlinux.org/index.php/CVE
Summary
=======
The package latex2rtf before version 2.3.10-1 is vulnerable to arbitrary
code execution.
Resolution
==========
Upgrade to 2.3.10-1.
# pacman -Syu "latex2rtf>=2.3.10-1"
The problem has been fixed upstream in version 2.3.10.
Workaround
==========
None.
Description
===========
A format string vulnerability was found in the CmdKeywords() function,
where the user-controlled variable 'keywords' is passed as a format
argument to vnsprintf(), when processing the \keywords command in a TeX
file.
Impact
======
An attacker can execute arbitrary code on the affected host by supplying
a crafted TeX file.
References
==========
http://www.openwall.com/lists/oss-security/2015/11/16/39
https://access.redhat.com/security/cve/CVE-2015-8106
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 801 bytes
Desc: OpenPGP digital signature
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20160506/8c285022/attachment.asc>
More information about the arch-security
mailing list