An issue was discovered in t1_check_unusual_charstring functions in writet1.c files in TeX Live before 2018-09-21. A buffer overflow in the handling of Type 1 fonts allows arbitrary code execution when a malicious font is loaded by one of the vulnerable tools: pdflatex, pdftex, dvips, or luatex.
References
Link | Resource |
---|---|
https://lists.debian.org/debian-security-announce/2018/msg00230.html | Mailing List Third Party Advisory |
https://github.com/TeX-Live/texlive-source/commit/6ed0077520e2b0da1fd060c7f88db7b2e6068e4c | Patch Third Party Advisory |
https://www.debian.org/security/2018/dsa-4299 | Third Party Advisory |
https://usn.ubuntu.com/3788-1/ | Third Party Advisory |
https://usn.ubuntu.com/3788-2/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2018-09-23 14:29
Updated : 2018-11-15 08:11
NVD link : CVE-2018-17407
Mitre link : CVE-2018-17407
JSON object : View
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
Products Affected
debian
- debian_linux
canonical
- ubuntu_linux
tug
- tex_live