Executive Summary
Summary | |
---|---|
Title | New mimetex packages fix several vulnerabilities |
Informations | |||
---|---|---|---|
Name | DSA-1917 | First vendor Publication | 2009-10-24 |
Vendor | Debian | Last vendor Modification | 2009-10-24 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 10 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Several vulnerabilities have been discovered in mimetex, a lightweight alternative to MathML. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2009-1382 Chris Evans and Damien Miller, discovered multiple stack-based buffer overflow. An attacker could execute arbitrary code via a TeX file with long picture, circle, input tags. CVE-2009-2459 Chris Evans discovered that mimeTeX contained certain directives that may be unsuitable for handling untrusted user input. A remote attacker can obtain sensitive information. For the oldstable distribution (etch), these problems have been fixed in version 1.50-1+etch1. Due to a bug in the archive system, the fix for the stable distribution (lenny) will be released as version 1.50-1+lenny1 once it is available. For the testing distribution (squeeze), and the unstable distribution (sid), these problems have been fixed in version 1.50-1.1. We recommend that you upgrade your mimetex packages. |
Original Source
Url : http://www.debian.org/security/2009/dsa-1917 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:13175 | |||
Oval ID: | oval:org.mitre.oval:def:13175 | ||
Title: | USN-844-1 -- mimetex vulnerabilities | ||
Description: | Chris Evans discovered that mimeTeX incorrectly handled certain long tags. An attacker could exploit this with a crafted mimeTeX expression and cause a denial of service or possibly execute arbitrary code. Chris Evans discovered that mimeTeX contained certain directives that may be unsuitable for handling untrusted user input. This update fixed the issue by disabling the \input and \counter tags | ||
Family: | unix | Class: | patch |
Reference(s): | USN-844-1 CVE-2009-1382 CVE-2009-2459 | Version: | 5 |
Platform(s): | Ubuntu 8.10 Ubuntu 8.04 Ubuntu 9.04 | Product(s): | mimetex |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:13271 | |||
Oval ID: | oval:org.mitre.oval:def:13271 | ||
Title: | DSA-1917-1 mimetex -- several vulnerabilities | ||
Description: | Several vulnerabilities have been discovered in mimetex, a lightweight alternative to MathML. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2009-1382 Chris Evans and Damien Miller, discovered multiple stack-based buffer overflow. An attacker could execute arbitrary code via a TeX file with long picture, circle, input tags. CVE-2009-2459 Chris Evans discovered that mimeTeX contained certain directives that may be unsuitable for handling untrusted user input. A remote attacker can obtain sensitive information. For the oldstable distribution, these problems have been fixed in version 1.50-1+etch1. Due to a bug in the archive system, the fix for the stable distribution will be released as version 1.50-1+lenny1 once it is available. For the testing distribution, and the unstable distribution, these problems have been fixed in version 1.50-1.1. We recommend that you upgrade your mimetex packages. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-1917-1 CVE-2009-1382 CVE-2009-2459 | Version: | 5 |
Platform(s): | Debian GNU/Linux 4.0 | Product(s): | mimetex |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:8178 | |||
Oval ID: | oval:org.mitre.oval:def:8178 | ||
Title: | DSA-1917 mimetex -- several vulnerabilities | ||
Description: | Several vulnerabilities have been discovered in mimetex, a lightweight alternative to MathML. The Common Vulnerabilities and Exposures project identifies the following problems: Chris Evans and Damien Miller, discovered multiple stack-based buffer overflow. An attacker could execute arbitrary code via a TeX file with long picture, circle, input tags. Chris Evans discovered that mimeTeX contained certain directives that may be unsuitable for handling untrusted user input. A remote attacker can obtain sensitive information. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-1917 CVE-2009-1382 CVE-2009-2459 | Version: | 3 |
Platform(s): | Debian GNU/Linux 4.0 | Product(s): | mimetex |
Definition Synopsis: | |||
OpenVAS Exploits
Date | Description |
---|---|
2010-04-16 | Name : Fedora Update for mimetex FEDORA-2010-6546 File : nvt/gb_fedora_2010_6546_mimetex_fc12.nasl |
2009-11-11 | Name : Fedora Core 11 FEDORA-2009-10170 (mimetex) File : nvt/fcore_2009_10170.nasl |
2009-11-11 | Name : Fedora Core 10 FEDORA-2009-10225 (mimetex) File : nvt/fcore_2009_10225.nasl |
2009-10-27 | Name : Debian Security Advisory DSA 1917-1 (mimetex) File : nvt/deb_1917_1.nasl |
2009-10-13 | Name : Ubuntu USN-844-1 (mimetex) File : nvt/ubuntu_844_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
56099 | mimeTeX Multiple TeX Directives Unspecified Issue |
56098 | mimeTeX mimetex.cgi Multiple Tags Arbitrary Code Execution |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2013-03-24 | Name : The remote Fedora host is missing a security update. File : fedora_2013-3902.nasl - Type : ACT_GATHER_INFO |
2013-03-24 | Name : The remote Fedora host is missing a security update. File : fedora_2013-3910.nasl - Type : ACT_GATHER_INFO |
2010-07-01 | Name : The remote Fedora host is missing a security update. File : fedora_2010-6546.nasl - Type : ACT_GATHER_INFO |
2010-02-24 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-1917.nasl - Type : ACT_GATHER_INFO |
2009-11-05 | Name : The remote Fedora host is missing a security update. File : fedora_2009-10170.nasl - Type : ACT_GATHER_INFO |
2009-11-05 | Name : The remote Fedora host is missing a security update. File : fedora_2009-10225.nasl - Type : ACT_GATHER_INFO |
2009-10-09 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-844-1.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:28:56 |
|