ID CVE-2011-1554
Summary Off-by-one error in t1lib 5.1.2 and earlier, as used in Xpdf before 3.02pl6, teTeX, and other products, allows remote attackers to cause a denial of service (application crash) via a PDF document containing a crafted Type 1 font that triggers an invalid memory read, integer overflow, and invalid pointer dereference, a different vulnerability than CVE-2011-0764.
References
Vulnerable Configurations
  • t1lib 0.1 Alpha
    cpe:2.3:a:t1lib:t1lib:0.1:alpha
  • t1lib 0.2 Beta
    cpe:2.3:a:t1lib:t1lib:0.2:beta
  • t1lib 0.3 Beta
    cpe:2.3:a:t1lib:t1lib:0.3:beta
  • t1lib 0.4 Beta
    cpe:2.3:a:t1lib:t1lib:0.4:beta
  • t1lib 0.5 Beta
    cpe:2.3:a:t1lib:t1lib:0.5:beta
  • t1lib 0.6 Beta
    cpe:2.3:a:t1lib:t1lib:0.6:beta
  • t1lib 0.7 Beta
    cpe:2.3:a:t1lib:t1lib:0.7:beta
  • t1lib 0.8 Beta
    cpe:2.3:a:t1lib:t1lib:0.8:beta
  • t1lib 0.9
    cpe:2.3:a:t1lib:t1lib:0.9
  • t1lib 0.9.1
    cpe:2.3:a:t1lib:t1lib:0.9.1
  • t1lib 0.9.2
    cpe:2.3:a:t1lib:t1lib:0.9.2
  • t1lib 1.0
    cpe:2.3:a:t1lib:t1lib:1.0
  • t1lib 1.0.1
    cpe:2.3:a:t1lib:t1lib:1.0.1
  • t1lib 1.1.0
    cpe:2.3:a:t1lib:t1lib:1.1.0
  • t1lib 1.1.1
    cpe:2.3:a:t1lib:t1lib:1.1.1
  • t1lib 1.2
    cpe:2.3:a:t1lib:t1lib:1.2
  • t1lib 1.3
    cpe:2.3:a:t1lib:t1lib:1.3
  • t1lib 1.3.1
    cpe:2.3:a:t1lib:t1lib:1.3.1
  • t1lib 5.0.0
    cpe:2.3:a:t1lib:t1lib:5.0.0
  • t1lib 5.0.1
    cpe:2.3:a:t1lib:t1lib:5.0.1
  • t1lib 5.0.2
    cpe:2.3:a:t1lib:t1lib:5.0.2
  • t1lib 5.1.0
    cpe:2.3:a:t1lib:t1lib:5.1.0
  • t1lib 5.1.1
    cpe:2.3:a:t1lib:t1lib:5.1.1
  • t1lib 5.1.2
    cpe:2.3:a:t1lib:t1lib:5.1.2
  • cpe:2.3:a:foolabs:xpdf:0.5a
    cpe:2.3:a:foolabs:xpdf:0.5a
  • cpe:2.3:a:foolabs:xpdf:0.7a
    cpe:2.3:a:foolabs:xpdf:0.7a
  • cpe:2.3:a:foolabs:xpdf:0.91a
    cpe:2.3:a:foolabs:xpdf:0.91a
  • cpe:2.3:a:foolabs:xpdf:0.91b
    cpe:2.3:a:foolabs:xpdf:0.91b
  • cpe:2.3:a:foolabs:xpdf:0.91c
    cpe:2.3:a:foolabs:xpdf:0.91c
  • cpe:2.3:a:foolabs:xpdf:0.92a
    cpe:2.3:a:foolabs:xpdf:0.92a
  • cpe:2.3:a:foolabs:xpdf:0.92b
    cpe:2.3:a:foolabs:xpdf:0.92b
  • cpe:2.3:a:foolabs:xpdf:0.92c
    cpe:2.3:a:foolabs:xpdf:0.92c
  • cpe:2.3:a:foolabs:xpdf:0.92d
    cpe:2.3:a:foolabs:xpdf:0.92d
  • cpe:2.3:a:foolabs:xpdf:0.92e
    cpe:2.3:a:foolabs:xpdf:0.92e
  • cpe:2.3:a:foolabs:xpdf:0.93a
    cpe:2.3:a:foolabs:xpdf:0.93a
  • cpe:2.3:a:foolabs:xpdf:0.93b
    cpe:2.3:a:foolabs:xpdf:0.93b
  • cpe:2.3:a:foolabs:xpdf:0.93c
    cpe:2.3:a:foolabs:xpdf:0.93c
  • cpe:2.3:a:foolabs:xpdf:1.00a
    cpe:2.3:a:foolabs:xpdf:1.00a
  • foolabs Xpdf 3.0.1
    cpe:2.3:a:foolabs:xpdf:3.0.1
  • cpe:2.3:a:foolabs:xpdf:3.02pl1
    cpe:2.3:a:foolabs:xpdf:3.02pl1
  • cpe:2.3:a:foolabs:xpdf:3.02pl2
    cpe:2.3:a:foolabs:xpdf:3.02pl2
  • cpe:2.3:a:foolabs:xpdf:3.02pl3
    cpe:2.3:a:foolabs:xpdf:3.02pl3
  • cpe:2.3:a:foolabs:xpdf:3.02pl4
    cpe:2.3:a:foolabs:xpdf:3.02pl4
  • Glyph & Cog XpdfReader 0.2
    cpe:2.3:a:glyphandcog:xpdfreader:0.2
  • Glyph & Cog XpdfReader 0.3
    cpe:2.3:a:glyphandcog:xpdfreader:0.3
  • Glyph & Cog XpdfReader 0.4
    cpe:2.3:a:glyphandcog:xpdfreader:0.4
  • Glyph & Cog XpdfReader 0.5
    cpe:2.3:a:glyphandcog:xpdfreader:0.5
  • Glyph & Cog XpdfReader 0.6
    cpe:2.3:a:glyphandcog:xpdfreader:0.6
  • Glyph & Cog XpdfReader 0.7
    cpe:2.3:a:glyphandcog:xpdfreader:0.7
  • Glyph & Cog XpdfReader 0.80
    cpe:2.3:a:glyphandcog:xpdfreader:0.80
  • Glyph & Cog XpdfReader 0.90
    cpe:2.3:a:glyphandcog:xpdfreader:0.90
  • Glyph & Cog XpdfReader 0.91
    cpe:2.3:a:glyphandcog:xpdfreader:0.91
  • Glyph & Cog XpdfReader 0.92
    cpe:2.3:a:glyphandcog:xpdfreader:0.92
  • Glyph & Cog XpdfReader 0.93
    cpe:2.3:a:glyphandcog:xpdfreader:0.93
  • Glyph & Cog XpdfReader 1.00
    cpe:2.3:a:glyphandcog:xpdfreader:1.00
  • Glyph & Cog XpdfReader 1.01
    cpe:2.3:a:glyphandcog:xpdfreader:1.01
  • Glyph & Cog XpdfReader 2.00
    cpe:2.3:a:glyphandcog:xpdfreader:2.00
  • Glyph & Cog XpdfReader 2.01
    cpe:2.3:a:glyphandcog:xpdfreader:2.01
  • Glyph & Cog XpdfReader 2.02
    cpe:2.3:a:glyphandcog:xpdfreader:2.02
  • Glyph & Cog XpdfReader 2.03
    cpe:2.3:a:glyphandcog:xpdfreader:2.03
  • Glyph & Cog XpdfReader 3.00
    cpe:2.3:a:glyphandcog:xpdfreader:3.00
  • Glyph & Cog XpdfReader 3.01
    cpe:2.3:a:glyphandcog:xpdfreader:3.01
  • Glyph & Cog XpdfReader 3.02
    cpe:2.3:a:glyphandcog:xpdfreader:3.02
CVSS
Base: 4.3 (as of 01-04-2011 - 10:57)
Impact:
Exploitability:
CWE CWE-189
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
nessus via4
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2012-1201.NASL
    description Updated tetex packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. teTeX is an implementation of TeX. TeX takes a text file and a set of formatting commands as input, and creates a typesetter-independent DeVice Independent (DVI) file as output. teTeX embeds a copy of t1lib to rasterize bitmaps from PostScript Type 1 fonts. The following issues affect t1lib code : Two heap-based buffer overflow flaws were found in the way t1lib processed Adobe Font Metrics (AFM) files. If a specially crafted font file was opened by teTeX, it could cause teTeX to crash or, potentially, execute arbitrary code with the privileges of the user running teTeX. (CVE-2010-2642, CVE-2011-0433) An invalid pointer dereference flaw was found in t1lib. A specially crafted font file could, when opened, cause teTeX to crash or, potentially, execute arbitrary code with the privileges of the user running teTeX. (CVE-2011-0764) A use-after-free flaw was found in t1lib. A specially crafted font file could, when opened, cause teTeX to crash or, potentially, execute arbitrary code with the privileges of the user running teTeX. (CVE-2011-1553) An off-by-one flaw was found in t1lib. A specially crafted font file could, when opened, cause teTeX to crash or, potentially, execute arbitrary code with the privileges of the user running teTeX. (CVE-2011-1554) An out-of-bounds memory read flaw was found in t1lib. A specially crafted font file could, when opened, cause teTeX to crash. (CVE-2011-1552) teTeX embeds a copy of Xpdf, an open source Portable Document Format (PDF) file viewer, to allow adding images in PDF format to the generated PDF documents. The following issues affect Xpdf code : An uninitialized pointer use flaw was discovered in Xpdf. If pdflatex was used to process a TeX document referencing a specially crafted PDF file, it could cause pdflatex to crash or, potentially, execute arbitrary code with the privileges of the user running pdflatex. (CVE-2010-3702) An array index error was found in the way Xpdf parsed PostScript Type 1 fonts embedded in PDF documents. If pdflatex was used to process a TeX document referencing a specially crafted PDF file, it could cause pdflatex to crash or, potentially, execute arbitrary code with the privileges of the user running pdflatex. (CVE-2010-3704) Red Hat would like to thank the Evince development team for reporting CVE-2010-2642. Upstream acknowledges Jon Larimer of IBM X-Force as the original reporter of CVE-2010-2642. All users of tetex are advised to upgrade to these updated packages, which contain backported patches to correct these issues.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 61651
    published 2012-08-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=61651
    title CentOS 5 : tetex (CESA-2012:1201)
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2012-1201.NASL
    description From Red Hat Security Advisory 2012:1201 : Updated tetex packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. teTeX is an implementation of TeX. TeX takes a text file and a set of formatting commands as input, and creates a typesetter-independent DeVice Independent (DVI) file as output. teTeX embeds a copy of t1lib to rasterize bitmaps from PostScript Type 1 fonts. The following issues affect t1lib code : Two heap-based buffer overflow flaws were found in the way t1lib processed Adobe Font Metrics (AFM) files. If a specially crafted font file was opened by teTeX, it could cause teTeX to crash or, potentially, execute arbitrary code with the privileges of the user running teTeX. (CVE-2010-2642, CVE-2011-0433) An invalid pointer dereference flaw was found in t1lib. A specially crafted font file could, when opened, cause teTeX to crash or, potentially, execute arbitrary code with the privileges of the user running teTeX. (CVE-2011-0764) A use-after-free flaw was found in t1lib. A specially crafted font file could, when opened, cause teTeX to crash or, potentially, execute arbitrary code with the privileges of the user running teTeX. (CVE-2011-1553) An off-by-one flaw was found in t1lib. A specially crafted font file could, when opened, cause teTeX to crash or, potentially, execute arbitrary code with the privileges of the user running teTeX. (CVE-2011-1554) An out-of-bounds memory read flaw was found in t1lib. A specially crafted font file could, when opened, cause teTeX to crash. (CVE-2011-1552) teTeX embeds a copy of Xpdf, an open source Portable Document Format (PDF) file viewer, to allow adding images in PDF format to the generated PDF documents. The following issues affect Xpdf code : An uninitialized pointer use flaw was discovered in Xpdf. If pdflatex was used to process a TeX document referencing a specially crafted PDF file, it could cause pdflatex to crash or, potentially, execute arbitrary code with the privileges of the user running pdflatex. (CVE-2010-3702) An array index error was found in the way Xpdf parsed PostScript Type 1 fonts embedded in PDF documents. If pdflatex was used to process a TeX document referencing a specially crafted PDF file, it could cause pdflatex to crash or, potentially, execute arbitrary code with the privileges of the user running pdflatex. (CVE-2010-3704) Red Hat would like to thank the Evince development team for reporting CVE-2010-2642. Upstream acknowledges Jon Larimer of IBM X-Force as the original reporter of CVE-2010-2642. All users of tetex are advised to upgrade to these updated packages, which contain backported patches to correct these issues.
    last seen 2019-02-21
    modified 2018-07-18
    plugin id 68602
    published 2013-07-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=68602
    title Oracle Linux 5 : tetex (ELSA-2012-1201)
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-201701-57.NASL
    description The remote host is affected by the vulnerability described in GLSA-201701-57 (T1Lib: : Multiple vulnerabilities) Multiple vulnerabilities have been discovered in T1Lib. Please review the CVE identifiers referenced below for details. Impact : Remote attackers, by coercing users to process specially crafted AFM font or PDF file, could cause a Denial of Service condition or execute arbitrary code. Workaround : There is no known workaround at this time.
    last seen 2019-02-21
    modified 2017-01-24
    plugin id 96710
    published 2017-01-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=96710
    title GLSA-201701-57 : T1Lib: : Multiple vulnerabilities
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2012-1201.NASL
    description Updated tetex packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. teTeX is an implementation of TeX. TeX takes a text file and a set of formatting commands as input, and creates a typesetter-independent DeVice Independent (DVI) file as output. teTeX embeds a copy of t1lib to rasterize bitmaps from PostScript Type 1 fonts. The following issues affect t1lib code : Two heap-based buffer overflow flaws were found in the way t1lib processed Adobe Font Metrics (AFM) files. If a specially crafted font file was opened by teTeX, it could cause teTeX to crash or, potentially, execute arbitrary code with the privileges of the user running teTeX. (CVE-2010-2642, CVE-2011-0433) An invalid pointer dereference flaw was found in t1lib. A specially crafted font file could, when opened, cause teTeX to crash or, potentially, execute arbitrary code with the privileges of the user running teTeX. (CVE-2011-0764) A use-after-free flaw was found in t1lib. A specially crafted font file could, when opened, cause teTeX to crash or, potentially, execute arbitrary code with the privileges of the user running teTeX. (CVE-2011-1553) An off-by-one flaw was found in t1lib. A specially crafted font file could, when opened, cause teTeX to crash or, potentially, execute arbitrary code with the privileges of the user running teTeX. (CVE-2011-1554) An out-of-bounds memory read flaw was found in t1lib. A specially crafted font file could, when opened, cause teTeX to crash. (CVE-2011-1552) teTeX embeds a copy of Xpdf, an open source Portable Document Format (PDF) file viewer, to allow adding images in PDF format to the generated PDF documents. The following issues affect Xpdf code : An uninitialized pointer use flaw was discovered in Xpdf. If pdflatex was used to process a TeX document referencing a specially crafted PDF file, it could cause pdflatex to crash or, potentially, execute arbitrary code with the privileges of the user running pdflatex. (CVE-2010-3702) An array index error was found in the way Xpdf parsed PostScript Type 1 fonts embedded in PDF documents. If pdflatex was used to process a TeX document referencing a specially crafted PDF file, it could cause pdflatex to crash or, potentially, execute arbitrary code with the privileges of the user running pdflatex. (CVE-2010-3704) Red Hat would like to thank the Evince development team for reporting CVE-2010-2642. Upstream acknowledges Jon Larimer of IBM X-Force as the original reporter of CVE-2010-2642. All users of tetex are advised to upgrade to these updated packages, which contain backported patches to correct these issues.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 61653
    published 2012-08-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=61653
    title RHEL 5 : tetex (RHSA-2012:1201)
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20120823_TETEX_ON_SL5_X.NASL
    description teTeX is an implementation of TeX. TeX takes a text file and a set of formatting commands as input, and creates a typesetter-independent DeVice Independent (DVI) file as output. teTeX embeds a copy of t1lib to rasterize bitmaps from PostScript Type 1 fonts. The following issues affect t1lib code : Two heap-based buffer overflow flaws were found in the way t1lib processed Adobe Font Metrics (AFM) files. If a specially crafted font file was opened by teTeX, it could cause teTeX to crash or, potentially, execute arbitrary code with the privileges of the user running teTeX. (CVE-2010-2642, CVE-2011-0433) An invalid pointer dereference flaw was found in t1lib. A specially crafted font file could, when opened, cause teTeX to crash or, potentially, execute arbitrary code with the privileges of the user running teTeX. (CVE-2011-0764) A use-after-free flaw was found in t1lib. A specially crafted font file could, when opened, cause teTeX to crash or, potentially, execute arbitrary code with the privileges of the user running teTeX. (CVE-2011-1553) An off-by-one flaw was found in t1lib. A specially crafted font file could, when opened, cause teTeX to crash or, potentially, execute arbitrary code with the privileges of the user running teTeX. (CVE-2011-1554) An out-of-bounds memory read flaw was found in t1lib. A specially crafted font file could, when opened, cause teTeX to crash. (CVE-2011-1552) teTeX embeds a copy of Xpdf, an open source Portable Document Format (PDF) file viewer, to allow adding images in PDF format to the generated PDF documents. The following issues affect Xpdf code : An uninitialized pointer use flaw was discovered in Xpdf. If pdflatex was used to process a TeX document referencing a specially crafted PDF file, it could cause pdflatex to crash or, potentially, execute arbitrary code with the privileges of the user running pdflatex. (CVE-2010-3702) An array index error was found in the way Xpdf parsed PostScript Type 1 fonts embedded in PDF documents. If pdflatex was used to process a TeX document referencing a specially crafted PDF file, it could cause pdflatex to crash or, potentially, execute arbitrary code with the privileges of the user running pdflatex. (CVE-2010-3704) All users of tetex are advised to upgrade to these updated packages, which contain backported patches to correct these issues.
    last seen 2019-02-21
    modified 2018-12-31
    plugin id 61657
    published 2012-08-24
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=61657
    title Scientific Linux Security Update : tetex on SL5.x i386/x86_64
  • NASL family Mandriva Local Security Checks
    NASL id MANDRIVA_MDVSA-2012-004.NASL
    description Multiple vulnerabilities has been found and corrected in t1lib : A heap-based buffer overflow flaw was found in the way AFM font file parser, used for rendering of DVI files, in GNOME evince document viewer and other products, processed line tokens from the given input stream. A remote attacker could provide a DVI file, with embedded specially crafted font file, and trick the local user to open it with an application using the AFM font parser, leading to that particular application crash or, potentially, arbitrary code execution with the privileges of the user running the application. Different vulnerability than CVE-2010-2642 (CVE-2011-0433). t1lib 5.1.2 and earlier reads from invalid memory locations, which allows remote attackers to cause a denial of service (application crash) via a crafted Type 1 font in a PDF document, a different vulnerability than CVE-2011-0764 (CVE-2011-1552). Use-after-free vulnerability in t1lib 5.1.2 and earlier allows remote attackers to cause a denial of service (application crash) via a PDF document containing a crafted Type 1 font that triggers an invalid memory write, a different vulnerability than CVE-2011-0764 (CVE-2011-1553). Off-by-one error in t1lib 5.1.2 and earlier allows remote attackers to cause a denial of service (application crash) via a PDF document containing a crafted Type 1 font that triggers an invalid memory read, integer overflow, and invalid pointer dereference, a different vulnerability than CVE-2011-0764 (CVE-2011-1554). The updated packages have been patched to correct these issues.
    last seen 2019-02-21
    modified 2018-07-19
    plugin id 57530
    published 2012-01-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=57530
    title Mandriva Linux Security Advisory : t1lib (MDVSA-2012:004)
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DSA-2388.NASL
    description Several vulnerabilities were discovered in t1lib, a Postscript Type 1 font rasterizer library, some of which might lead to code execution through the opening of files embedding bad fonts. - CVE-2010-2642 A heap-based buffer overflow in the AFM font metrics parser potentially leads to the execution of arbitrary code. - CVE-2011-0433 Another heap-based buffer overflow in the AFM font metrics parser potentially leads to the execution of arbitrary code. - CVE-2011-0764 An invalid pointer dereference allows execution of arbitrary code using crafted Type 1 fonts. - CVE-2011-1552 Another invalid pointer dereference results in an application crash, triggered by crafted Type 1 fonts. - CVE-2011-1553 A use-after-free vulnerability results in an application crash, triggered by crafted Type 1 fonts. - CVE-2011-1554 An off-by-one error results in an invalid memory read and application crash, triggered by crafted Type 1 fonts.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 57542
    published 2012-01-16
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=57542
    title Debian DSA-2388-1 : t1lib - several vulnerabilities
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2012-0289.NASL
    description This update fixes several security flaws in t1lib (flaws in AFM parser and when handling specially crafted Type1 fonts). Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2015-10-20
    plugin id 57716
    published 2012-01-30
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=57716
    title Fedora 16 : t1lib-5.1.2-9.fc16 (2012-0289)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_T1LIB-120423.NASL
    description This update of t1lib fixes memory corruptions and a heap-based overflow in the afm font parser.
    last seen 2019-02-21
    modified 2013-10-25
    plugin id 64228
    published 2013-01-25
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=64228
    title SuSE 11.1 Security Update : t1lib (SAT Patch Number 6195)
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2012-249.NASL
    description Specially crafted type1 fonts could cause memory corruptions in t1lib
    last seen 2018-11-13
    modified 2018-11-10
    plugin id 74611
    published 2014-06-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=74611
    title openSUSE Security Update : t1lib (openSUSE-SU-2012:0559-1)
  • NASL family Slackware Local Security Checks
    NASL id SLACKWARE_SSA_2012-228-01.NASL
    description New t1lib packages are available for Slackware 12.1, 12.2, 13.0, 13.1, 13.37, and -current to fix security issues.
    last seen 2019-02-21
    modified 2013-06-01
    plugin id 61552
    published 2012-08-16
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=61552
    title Slackware 12.1 / 12.2 / 13.0 / 13.1 / 13.37 / current : t1lib (SSA:2012-228-01)
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2012-0062.NASL
    description From Red Hat Security Advisory 2012:0062 : Updated t1lib packages that fix multiple security issues are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. The t1lib library allows you to rasterize bitmaps from PostScript Type 1 fonts. Two heap-based buffer overflow flaws were found in the way t1lib processed Adobe Font Metrics (AFM) files. If a specially crafted font file was opened by an application linked against t1lib, it could cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2010-2642, CVE-2011-0433) An invalid pointer dereference flaw was found in t1lib. A specially crafted font file could, when opened, cause an application linked against t1lib to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2011-0764) A use-after-free flaw was found in t1lib. A specially crafted font file could, when opened, cause an application linked against t1lib to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2011-1553) An off-by-one flaw was found in t1lib. A specially crafted font file could, when opened, cause an application linked against t1lib to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2011-1554) An out-of-bounds memory read flaw was found in t1lib. A specially crafted font file could, when opened, cause an application linked against t1lib to crash. (CVE-2011-1552) Red Hat would like to thank the Evince development team for reporting CVE-2010-2642. Upstream acknowledges Jon Larimer of IBM X-Force as the original reporter of CVE-2010-2642. All users of t1lib are advised to upgrade to these updated packages, which contain backported patches to correct these issues. All applications linked against t1lib must be restarted for this update to take effect.
    last seen 2019-02-21
    modified 2018-07-18
    plugin id 68439
    published 2013-07-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=68439
    title Oracle Linux 6 : t1lib (ELSA-2012-0062)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2012-0062.NASL
    description Updated t1lib packages that fix multiple security issues are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. The t1lib library allows you to rasterize bitmaps from PostScript Type 1 fonts. Two heap-based buffer overflow flaws were found in the way t1lib processed Adobe Font Metrics (AFM) files. If a specially crafted font file was opened by an application linked against t1lib, it could cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2010-2642, CVE-2011-0433) An invalid pointer dereference flaw was found in t1lib. A specially crafted font file could, when opened, cause an application linked against t1lib to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2011-0764) A use-after-free flaw was found in t1lib. A specially crafted font file could, when opened, cause an application linked against t1lib to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2011-1553) An off-by-one flaw was found in t1lib. A specially crafted font file could, when opened, cause an application linked against t1lib to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2011-1554) An out-of-bounds memory read flaw was found in t1lib. A specially crafted font file could, when opened, cause an application linked against t1lib to crash. (CVE-2011-1552) Red Hat would like to thank the Evince development team for reporting CVE-2010-2642. Upstream acknowledges Jon Larimer of IBM X-Force as the original reporter of CVE-2010-2642. All users of t1lib are advised to upgrade to these updated packages, which contain backported patches to correct these issues. All applications linked against t1lib must be restarted for this update to take effect.
    last seen 2019-02-21
    modified 2018-11-26
    plugin id 57679
    published 2012-01-25
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=57679
    title RHEL 6 : t1lib (RHSA-2012:0062)
  • NASL family Amazon Linux Local Security Checks
    NASL id ALA_ALAS-2012-48.NASL
    description TeX Live embeds a copy of t1lib. The t1lib library allows you to rasterize bitmaps from PostScript Type 1 fonts. The following issues affect t1lib code : Two heap-based buffer overflow flaws were found in the way t1lib processed Adobe Font Metrics (AFM) files. If a specially crafted font file was opened by a TeX Live utility, it could cause the utility to crash or, potentially, execute arbitrary code with the privileges of the user running the utility. (CVE-2010-2642 , CVE-2011-0433) An invalid pointer dereference flaw was found in t1lib. A specially crafted font file could, when opened, cause a TeX Live utility to crash or, potentially, execute arbitrary code with the privileges of the user running the utility. (CVE-2011-0764) A use-after-free flaw was found in t1lib. A specially crafted font file could, when opened, cause a TeX Live utility to crash or, potentially, execute arbitrary code with the privileges of the user running the utility. (CVE-2011-1553) An off-by-one flaw was found in t1lib. A specially crafted font file could, when opened, cause a TeX Live utility to crash or, potentially, execute arbitrary code with the privileges of the user running the utility. (CVE-2011-1554) An out-of-bounds memory read flaw was found in t1lib. A specially crafted font file could, when opened, cause a TeX Live utility to crash. (CVE-2011-1552)
    last seen 2019-02-21
    modified 2018-04-18
    plugin id 69655
    published 2013-09-04
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=69655
    title Amazon Linux AMI : texlive (ALAS-2012-48)
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2012-0137.NASL
    description From Red Hat Security Advisory 2012:0137 : Updated texlive packages that fix multiple security issues are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. TeX Live is an implementation of TeX. TeX takes a text file and a set of formatting commands as input, and creates a typesetter-independent DeVice Independent (DVI) file as output. The texlive packages provide a number of utilities, including dvips. TeX Live embeds a copy of t1lib. The t1lib library allows you to rasterize bitmaps from PostScript Type 1 fonts. The following issues affect t1lib code : Two heap-based buffer overflow flaws were found in the way t1lib processed Adobe Font Metrics (AFM) files. If a specially crafted font file was opened by a TeX Live utility, it could cause the utility to crash or, potentially, execute arbitrary code with the privileges of the user running the utility. (CVE-2010-2642, CVE-2011-0433) An invalid pointer dereference flaw was found in t1lib. A specially crafted font file could, when opened, cause a TeX Live utility to crash or, potentially, execute arbitrary code with the privileges of the user running the utility. (CVE-2011-0764) A use-after-free flaw was found in t1lib. A specially crafted font file could, when opened, cause a TeX Live utility to crash or, potentially, execute arbitrary code with the privileges of the user running the utility. (CVE-2011-1553) An off-by-one flaw was found in t1lib. A specially crafted font file could, when opened, cause a TeX Live utility to crash or, potentially, execute arbitrary code with the privileges of the user running the utility. (CVE-2011-1554) An out-of-bounds memory read flaw was found in t1lib. A specially crafted font file could, when opened, cause a TeX Live utility to crash. (CVE-2011-1552) Red Hat would like to thank the Evince development team for reporting CVE-2010-2642. Upstream acknowledges Jon Larimer of IBM X-Force as the original reporter of CVE-2010-2642. All users of texlive are advised to upgrade to these updated packages, which contain backported patches to correct these issues.
    last seen 2019-02-21
    modified 2018-07-18
    plugin id 68461
    published 2013-07-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=68461
    title Oracle Linux 6 : texlive (ELSA-2012-0137)
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2012-0062.NASL
    description Updated t1lib packages that fix multiple security issues are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. The t1lib library allows you to rasterize bitmaps from PostScript Type 1 fonts. Two heap-based buffer overflow flaws were found in the way t1lib processed Adobe Font Metrics (AFM) files. If a specially crafted font file was opened by an application linked against t1lib, it could cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2010-2642, CVE-2011-0433) An invalid pointer dereference flaw was found in t1lib. A specially crafted font file could, when opened, cause an application linked against t1lib to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2011-0764) A use-after-free flaw was found in t1lib. A specially crafted font file could, when opened, cause an application linked against t1lib to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2011-1553) An off-by-one flaw was found in t1lib. A specially crafted font file could, when opened, cause an application linked against t1lib to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2011-1554) An out-of-bounds memory read flaw was found in t1lib. A specially crafted font file could, when opened, cause an application linked against t1lib to crash. (CVE-2011-1552) Red Hat would like to thank the Evince development team for reporting CVE-2010-2642. Upstream acknowledges Jon Larimer of IBM X-Force as the original reporter of CVE-2010-2642. All users of t1lib are advised to upgrade to these updated packages, which contain backported patches to correct these issues. All applications linked against t1lib must be restarted for this update to take effect.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 57732
    published 2012-01-31
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=57732
    title CentOS 6 : t1lib (CESA-2012:0062)
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2012-0137.NASL
    description Updated texlive packages that fix multiple security issues are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. TeX Live is an implementation of TeX. TeX takes a text file and a set of formatting commands as input, and creates a typesetter-independent DeVice Independent (DVI) file as output. The texlive packages provide a number of utilities, including dvips. TeX Live embeds a copy of t1lib. The t1lib library allows you to rasterize bitmaps from PostScript Type 1 fonts. The following issues affect t1lib code : Two heap-based buffer overflow flaws were found in the way t1lib processed Adobe Font Metrics (AFM) files. If a specially crafted font file was opened by a TeX Live utility, it could cause the utility to crash or, potentially, execute arbitrary code with the privileges of the user running the utility. (CVE-2010-2642, CVE-2011-0433) An invalid pointer dereference flaw was found in t1lib. A specially crafted font file could, when opened, cause a TeX Live utility to crash or, potentially, execute arbitrary code with the privileges of the user running the utility. (CVE-2011-0764) A use-after-free flaw was found in t1lib. A specially crafted font file could, when opened, cause a TeX Live utility to crash or, potentially, execute arbitrary code with the privileges of the user running the utility. (CVE-2011-1553) An off-by-one flaw was found in t1lib. A specially crafted font file could, when opened, cause a TeX Live utility to crash or, potentially, execute arbitrary code with the privileges of the user running the utility. (CVE-2011-1554) An out-of-bounds memory read flaw was found in t1lib. A specially crafted font file could, when opened, cause a TeX Live utility to crash. (CVE-2011-1552) Red Hat would like to thank the Evince development team for reporting CVE-2010-2642. Upstream acknowledges Jon Larimer of IBM X-Force as the original reporter of CVE-2010-2642. All users of texlive are advised to upgrade to these updated packages, which contain backported patches to correct these issues.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 57982
    published 2012-02-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=57982
    title CentOS 6 : texlive (CESA-2012:0137)
  • NASL family Amazon Linux Local Security Checks
    NASL id ALA_ALAS-2012-40.NASL
    description Two heap-based buffer overflow flaws were found in the way t1lib processed Adobe Font Metrics (AFM) files. If a specially crafted font file was opened by an application linked against t1lib, it could cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2010-2642 , CVE-2011-0433) An invalid pointer dereference flaw was found in t1lib. A specially crafted font file could, when opened, cause an application linked against t1lib to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2011-0764) A use-after-free flaw was found in t1lib. A specially crafted font file could, when opened, cause an application linked against t1lib to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2011-1553) An off-by-one flaw was found in t1lib. A specially crafted font file could, when opened, cause an application linked against t1lib to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2011-1554) An out-of-bounds memory read flaw was found in t1lib. A specially crafted font file could, when opened, cause an application linked against t1lib to crash. (CVE-2011-1552)
    last seen 2019-02-21
    modified 2018-04-18
    plugin id 69647
    published 2013-09-04
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=69647
    title Amazon Linux AMI : t1lib (ALAS-2012-40)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2012-0137.NASL
    description Updated texlive packages that fix multiple security issues are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. TeX Live is an implementation of TeX. TeX takes a text file and a set of formatting commands as input, and creates a typesetter-independent DeVice Independent (DVI) file as output. The texlive packages provide a number of utilities, including dvips. TeX Live embeds a copy of t1lib. The t1lib library allows you to rasterize bitmaps from PostScript Type 1 fonts. The following issues affect t1lib code : Two heap-based buffer overflow flaws were found in the way t1lib processed Adobe Font Metrics (AFM) files. If a specially crafted font file was opened by a TeX Live utility, it could cause the utility to crash or, potentially, execute arbitrary code with the privileges of the user running the utility. (CVE-2010-2642, CVE-2011-0433) An invalid pointer dereference flaw was found in t1lib. A specially crafted font file could, when opened, cause a TeX Live utility to crash or, potentially, execute arbitrary code with the privileges of the user running the utility. (CVE-2011-0764) A use-after-free flaw was found in t1lib. A specially crafted font file could, when opened, cause a TeX Live utility to crash or, potentially, execute arbitrary code with the privileges of the user running the utility. (CVE-2011-1553) An off-by-one flaw was found in t1lib. A specially crafted font file could, when opened, cause a TeX Live utility to crash or, potentially, execute arbitrary code with the privileges of the user running the utility. (CVE-2011-1554) An out-of-bounds memory read flaw was found in t1lib. A specially crafted font file could, when opened, cause a TeX Live utility to crash. (CVE-2011-1552) Red Hat would like to thank the Evince development team for reporting CVE-2010-2642. Upstream acknowledges Jon Larimer of IBM X-Force as the original reporter of CVE-2010-2642. All users of texlive are advised to upgrade to these updated packages, which contain backported patches to correct these issues.
    last seen 2019-02-21
    modified 2018-11-26
    plugin id 57969
    published 2012-02-16
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=57969
    title RHEL 6 : texlive (RHSA-2012:0137)
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20120215_TEXLIVE_ON_SL6_X.NASL
    description TeX Live is an implementation of TeX. TeX takes a text file and a set of formatting commands as input, and creates a typesetter-independent DeVice Independent (DVI) file as output. The texlive packages provide a number of utilities, including dvips. TeX Live embeds a copy of t1lib. The t1lib library allows you to rasterize bitmaps from PostScript Type 1 fonts. The following issues affect t1lib code : Two heap-based buffer overflow flaws were found in the way t1lib processed Adobe Font Metrics (AFM) files. If a specially crafted font file was opened by a TeX Live utility, it could cause the utility to crash or, potentially, execute arbitrary code with the privileges of the user running the utility. (CVE-2010-2642, CVE-2011-0433) An invalid pointer dereference flaw was found in t1lib. A specially crafted font file could, when opened, cause a TeX Live utility to crash or, potentially, execute arbitrary code with the privileges of the user running the utility. (CVE-2011-0764) A use-after-free flaw was found in t1lib. A specially crafted font file could, when opened, cause a TeX Live utility to crash or, potentially, execute arbitrary code with the privileges of the user running the utility. (CVE-2011-1553) An off-by-one flaw was found in t1lib. A specially crafted font file could, when opened, cause a TeX Live utility to crash or, potentially, execute arbitrary code with the privileges of the user running the utility. (CVE-2011-1554) An out-of-bounds memory read flaw was found in t1lib. A specially crafted font file could, when opened, cause a TeX Live utility to crash. (CVE-2011-1552) All users of texlive are advised to upgrade to these updated packages, which contain backported patches to correct these issues.
    last seen 2019-02-21
    modified 2018-12-31
    plugin id 61250
    published 2012-08-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=61250
    title Scientific Linux Security Update : texlive on SL6.x i386/x86_64
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20120124_T1LIB_ON_SL6_X.NASL
    description The t1lib library allows you to rasterize bitmaps from PostScript Type 1 fonts. Two heap-based buffer overflow flaws were found in the way t1lib processed Adobe Font Metrics (AFM) files. If a specially crafted font file was opened by an application linked against t1lib, it could cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2010-2642, CVE-2011-0433) An invalid pointer dereference flaw was found in t1lib. A specially crafted font file could, when opened, cause an application linked against t1lib to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2011-0764) A use-after-free flaw was found in t1lib. A specially crafted font file could, when opened, cause an application linked against t1lib to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2011-1553) An off-by-one flaw was found in t1lib. A specially crafted font file could, when opened, cause an application linked against t1lib to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2011-1554) An out-of-bounds memory read flaw was found in t1lib. A specially crafted font file could, when opened, cause an application linked against t1lib to crash. (CVE-2011-1552) All users of t1lib are advised to upgrade to these updated packages, which contain backported patches to correct these issues. All applications linked against t1lib must be restarted for this update to take effect.
    last seen 2019-02-21
    modified 2018-12-31
    plugin id 61226
    published 2012-08-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=61226
    title Scientific Linux Security Update : t1lib on SL6.x i386/x86_64
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2012-0266.NASL
    description This update fixes several security flaws in t1lib (flaws in AFM parser and when handling specially crafted Type1 fonts). Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2015-10-20
    plugin id 57715
    published 2012-01-30
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=57715
    title Fedora 15 : t1lib-5.1.2-9.fc15 (2012-0266)
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-1335-1.NASL
    description Jon Larimer discovered that t1lib did not properly parse AFM fonts. If a user were tricked into using a specially crafted font file, a remote attacker could cause t1lib to crash or possibly execute arbitrary code with user privileges. (CVE-2010-2642, CVE-2011-0433) Jonathan Brossard discovered that t1lib did not correctly handle certain malformed font files. If a user were tricked into using a specially crafted font file, a remote attacker could cause t1lib to crash. (CVE-2011-1552, CVE-2011-1553, CVE-2011-1554). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-12-01
    plugin id 57616
    published 2012-01-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=57616
    title Ubuntu 10.04 LTS / 10.10 / 11.04 / 11.10 : t1lib vulnerabilities (USN-1335-1)
redhat via4
advisories
  • bugzilla
    id 692909
    title CVE-2011-0764 t1lib: Invalid pointer dereference via crafted Type 1 font
    oval
    AND
    • OR
      • comment Red Hat Enterprise Linux 6 Client is installed
        oval oval:com.redhat.rhba:tst:20111656001
      • comment Red Hat Enterprise Linux 6 Server is installed
        oval oval:com.redhat.rhba:tst:20111656002
      • comment Red Hat Enterprise Linux 6 Workstation is installed
        oval oval:com.redhat.rhba:tst:20111656003
      • comment Red Hat Enterprise Linux 6 ComputeNode is installed
        oval oval:com.redhat.rhba:tst:20111656004
    • OR
      • AND
        • comment t1lib is earlier than 0:5.1.2-6.el6_2.1
          oval oval:com.redhat.rhsa:tst:20120062005
        • comment t1lib is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20120062006
      • AND
        • comment t1lib-apps is earlier than 0:5.1.2-6.el6_2.1
          oval oval:com.redhat.rhsa:tst:20120062011
        • comment t1lib-apps is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20120062012
      • AND
        • comment t1lib-devel is earlier than 0:5.1.2-6.el6_2.1
          oval oval:com.redhat.rhsa:tst:20120062009
        • comment t1lib-devel is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20120062010
      • AND
        • comment t1lib-static is earlier than 0:5.1.2-6.el6_2.1
          oval oval:com.redhat.rhsa:tst:20120062007
        • comment t1lib-static is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20120062008
    rhsa
    id RHSA-2012:0062
    released 2012-01-24
    severity Moderate
    title RHSA-2012:0062: t1lib security update (Moderate)
  • bugzilla
    id 692909
    title CVE-2011-0764 t1lib: Invalid pointer dereference via crafted Type 1 font
    oval
    AND
    • OR
      • comment Red Hat Enterprise Linux 6 Client is installed
        oval oval:com.redhat.rhba:tst:20111656001
      • comment Red Hat Enterprise Linux 6 Server is installed
        oval oval:com.redhat.rhba:tst:20111656002
      • comment Red Hat Enterprise Linux 6 Workstation is installed
        oval oval:com.redhat.rhba:tst:20111656003
      • comment Red Hat Enterprise Linux 6 ComputeNode is installed
        oval oval:com.redhat.rhba:tst:20111656004
    • OR
      • AND
        • comment kpathsea is earlier than 0:2007-57.el6_2
          oval oval:com.redhat.rhsa:tst:20120137017
        • comment kpathsea is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20120137018
      • AND
        • comment kpathsea-devel is earlier than 0:2007-57.el6_2
          oval oval:com.redhat.rhsa:tst:20120137011
        • comment kpathsea-devel is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20120137012
      • AND
        • comment mendexk is earlier than 0:2.6e-57.el6_2
          oval oval:com.redhat.rhsa:tst:20120137019
        • comment mendexk is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20120137020
      • AND
        • comment texlive is earlier than 0:2007-57.el6_2
          oval oval:com.redhat.rhsa:tst:20120137005
        • comment texlive is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20120137006
      • AND
        • comment texlive-afm is earlier than 0:2007-57.el6_2
          oval oval:com.redhat.rhsa:tst:20120137023
        • comment texlive-afm is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20120137024
      • AND
        • comment texlive-context is earlier than 0:2007-57.el6_2
          oval oval:com.redhat.rhsa:tst:20120137025
        • comment texlive-context is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20120137026
      • AND
        • comment texlive-dvips is earlier than 0:2007-57.el6_2
          oval oval:com.redhat.rhsa:tst:20120137009
        • comment texlive-dvips is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20120137010
      • AND
        • comment texlive-dviutils is earlier than 0:2007-57.el6_2
          oval oval:com.redhat.rhsa:tst:20120137027
        • comment texlive-dviutils is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20120137028
      • AND
        • comment texlive-east-asian is earlier than 0:2007-57.el6_2
          oval oval:com.redhat.rhsa:tst:20120137021
        • comment texlive-east-asian is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20120137022
      • AND
        • comment texlive-latex is earlier than 0:2007-57.el6_2
          oval oval:com.redhat.rhsa:tst:20120137007
        • comment texlive-latex is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20120137008
      • AND
        • comment texlive-utils is earlier than 0:2007-57.el6_2
          oval oval:com.redhat.rhsa:tst:20120137015
        • comment texlive-utils is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20120137016
      • AND
        • comment texlive-xetex is earlier than 0:2007-57.el6_2
          oval oval:com.redhat.rhsa:tst:20120137013
        • comment texlive-xetex is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20120137014
    rhsa
    id RHSA-2012:0137
    released 2012-02-15
    severity Moderate
    title RHSA-2012:0137: texlive security update (Moderate)
  • bugzilla
    id 692909
    title CVE-2011-0764 t1lib: Invalid pointer dereference via crafted Type 1 font
    oval
    AND
    • comment Red Hat Enterprise Linux 5 is installed
      oval oval:com.redhat.rhba:tst:20070331001
    • OR
      • AND
        • comment tetex is earlier than 0:3.0-33.15.el5_8.1
          oval oval:com.redhat.rhsa:tst:20121201002
        • comment tetex is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20070731025
      • AND
        • comment tetex-afm is earlier than 0:3.0-33.15.el5_8.1
          oval oval:com.redhat.rhsa:tst:20121201010
        • comment tetex-afm is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20070731037
      • AND
        • comment tetex-doc is earlier than 0:3.0-33.15.el5_8.1
          oval oval:com.redhat.rhsa:tst:20121201004
        • comment tetex-doc is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20070731031
      • AND
        • comment tetex-dvips is earlier than 0:3.0-33.15.el5_8.1
          oval oval:com.redhat.rhsa:tst:20121201012
        • comment tetex-dvips is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20070731033
      • AND
        • comment tetex-fonts is earlier than 0:3.0-33.15.el5_8.1
          oval oval:com.redhat.rhsa:tst:20121201006
        • comment tetex-fonts is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20070731035
      • AND
        • comment tetex-latex is earlier than 0:3.0-33.15.el5_8.1
          oval oval:com.redhat.rhsa:tst:20121201014
        • comment tetex-latex is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20070731027
      • AND
        • comment tetex-xdvi is earlier than 0:3.0-33.15.el5_8.1
          oval oval:com.redhat.rhsa:tst:20121201008
        • comment tetex-xdvi is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20070731029
    rhsa
    id RHSA-2012:1201
    released 2012-08-23
    severity Moderate
    title RHSA-2012:1201: tetex security update (Moderate)
rpms
  • t1lib-0:5.1.2-6.el6_2.1
  • t1lib-apps-0:5.1.2-6.el6_2.1
  • t1lib-devel-0:5.1.2-6.el6_2.1
  • t1lib-static-0:5.1.2-6.el6_2.1
  • kpathsea-0:2007-57.el6_2
  • kpathsea-devel-0:2007-57.el6_2
  • mendexk-0:2.6e-57.el6_2
  • texlive-0:2007-57.el6_2
  • texlive-afm-0:2007-57.el6_2
  • texlive-context-0:2007-57.el6_2
  • texlive-dvips-0:2007-57.el6_2
  • texlive-dviutils-0:2007-57.el6_2
  • texlive-east-asian-0:2007-57.el6_2
  • texlive-latex-0:2007-57.el6_2
  • texlive-utils-0:2007-57.el6_2
  • texlive-xetex-0:2007-57.el6_2
  • tetex-0:3.0-33.15.el5_8.1
  • tetex-afm-0:3.0-33.15.el5_8.1
  • tetex-doc-0:3.0-33.15.el5_8.1
  • tetex-dvips-0:3.0-33.15.el5_8.1
  • tetex-fonts-0:3.0-33.15.el5_8.1
  • tetex-latex-0:3.0-33.15.el5_8.1
  • tetex-xdvi-0:3.0-33.15.el5_8.1
refmap via4
bugtraq 20110327 TSSA-2011-01 xpdf : multiple vulnerabilities allow remote code execution
cert-vn VU#376500
confirm
gentoo GLSA-201701-57
mandriva MDVSA-2012:144
misc http://www.toucan-system.com/advisories/tssa-2011-01.txt
sectrack 1025266
secunia
  • 43823
  • 48985
sreason 8171
vupen ADV-2011-0728
Last major update 18-12-2012 - 23:39
Published 31-03-2011 - 19:55
Last modified 06-03-2019 - 11:30
Back to Top