7.6
CVSSv2

CVE-2010-2642

Published: 07/01/2011 Updated: 01/07/2017
CVSS v2 Base Score: 7.6 | Impact Score: 10 | Exploitability Score: 4.9
VMScore: 676
Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C

Vulnerability Summary

Heap-based buffer overflow in the AFM font parser in the dvi-backend component in Evince 2.32 and previous versions, teTeX 3.0, t1lib 5.1.2, and possibly other products allows remote malicious users to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font in conjunction with a DVI file that is processed by the thumbnailer.

Vulnerable Product Search on Vulmon Subscribe to Product

redhat evince 2.31.92

redhat evince 2.31.4.1

redhat evince 2.31.6

redhat evince 2.31.1

redhat evince 2.29.92

redhat evince 2.25

redhat evince 2.24

redhat evince 0.6

redhat evince 0.7

tug tetex 3.0

t1lib t1lib 5.1.2

redhat evince 2.31.4

redhat evince 2.30.3

redhat evince 2.29

redhat evince 2.28

redhat evince 2.22

redhat evince 2.19

redhat evince 0.2

redhat evince 0.3

redhat evince 2.31.6.1

redhat evince 2.31.90

redhat evince 2.31

redhat evince 2.30

redhat evince 2.23

redhat evince 2.21

redhat evince 0.4

redhat evince 0.5

redhat evince 2.30.2

redhat evince 2.31.2

redhat evince 2.27

redhat evince 2.26

redhat evince 2.20

redhat evince 0.8

redhat evince 0.9

redhat evince 0.1

redhat evince

Vendor Advisories

Debian Bug report logs - #609534 CVE-2010-2640/CVE-2010-2641/CVE-2010-2642/CVE-2010-2643 Package: evince; Maintainer for evince is Debian GNOME Maintainers <pkg-gnome-maintainers@listsaliothdebianorg>; Source for evince is src:evince (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <muehlenhoff@univentionde> ...
Jon Larimer discovered that Evince’s font parsers incorrectly handled certain buffer lengths when rendering a DVI file By tricking a user into opening or previewing a DVI file that uses a specially crafted font file, an attacker could crash evince or execute arbitrary code with the user’s privileges ...
t1lib could be made to crash or run programs as your login if it opened a specially crafted font file ...
Synopsis Moderate: t1lib security update Type/Severity Security Advisory: Moderate Topic Updated t1lib packages that fix multiple security issues are now availablefor Red Hat Enterprise Linux 6The Red Hat Security Response Team has rated this update as having moderatesecurity impact Common Vulnerability S ...
Synopsis Moderate: texlive security update Type/Severity Security Advisory: Moderate Topic Updated texlive packages that fix multiple security issues are nowavailable for Red Hat Enterprise Linux 6The Red Hat Security Response Team has rated this update as having moderatesecurity impact Common Vulnerabili ...
Synopsis Moderate: tetex security update Type/Severity Security Advisory: Moderate Topic Updated tetex packages that fix multiple security issues are now availablefor Red Hat Enterprise Linux 5The Red Hat Security Response Team has rated this update as having moderatesecurity impact Common Vulnerability S ...
Jon Larimer from IBM X-Force Advanced Research discovered multiple vulnerabilities in the DVI backend of the Evince document viewer: CVE-2010-2640 Insufficient array bounds checks in the PK fonts parser could lead to function pointer overwrite, causing arbitrary code execution CVE-2010-2641 Insufficient array bounds checks in the VF f ...
Several vulnerabilities were discovered in t1lib, a Postscript Type 1 font rasterizer library, some of which might lead to code execution through the opening of files embedding bad fonts CVE-2010-2642 A heap-based buffer overflow in the AFM font metrics parser potentially leads to the execution of arbitrary code CVE-2011-0433 Another heap-bas ...
TeX Live embeds a copy of t1lib The t1lib library allows you to rasterize bitmaps from PostScript Type 1 fonts The following issues affect t1lib code: Two heap-based buffer overflow flaws were found in the way t1lib processed Adobe Font Metrics (AFM) files If a specially-crafted font file was opened by a TeX Live utility, it could cause the util ...
Two heap-based buffer overflow flaws were found in the way t1lib processed Adobe Font Metrics (AFM) files If a specially-crafted font file was opened by an application linked against t1lib, it could cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application (CVE-2010-2642, CVE-20 ...

References

CWE-119http://git.gnome.org/browse/evince/commit/?id=d4139205b010ed06310d14284e63114e88ec6de2http://secunia.com/advisories/42769https://bugzilla.redhat.com/show_bug.cgi?id=666318http://secunia.com/advisories/42821http://www.redhat.com/support/errata/RHSA-2011-0009.htmlhttp://www.vupen.com/english/advisories/2011/0029http://www.securityfocus.com/bid/45678http://www.vupen.com/english/advisories/2011/0043http://www.ubuntu.com/usn/USN-1035-1http://www.securitytracker.com/id?1024937http://secunia.com/advisories/42847http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052910.htmlhttp://www.vupen.com/english/advisories/2011/0056http://secunia.com/advisories/42872http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052995.htmlhttp://lists.mandriva.com/security-announce/2011-01/msg00006.phphttp://www.vupen.com/english/advisories/2011/0097http://www.vupen.com/english/advisories/2011/0102http://www.mandriva.com/security/advisories?name=MDVSA-2011:017http://www.vupen.com/english/advisories/2011/0193http://www.vupen.com/english/advisories/2011/0194http://www.mandriva.com/security/advisories?name=MDVSA-2011:016http://www.debian.org/security/2011/dsa-2357http://rhn.redhat.com/errata/RHSA-2012-1201.htmlhttp://www.mandriva.com/security/advisories?name=MDVSA-2012:144http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.htmlhttps://security.gentoo.org/glsa/201701-57https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=609534https://usn.ubuntu.com/1035-1/https://nvd.nist.gov