Buffer overflow in the open_sty function in mkind.c for makeindex 2.14 in teTeX might allow user-assisted remote attackers to overwrite files and possibly execute arbitrary code via a long filename. NOTE: other overflows exist but might not be exploitable, such as a heap-based overflow in the check_idx function.
Link | Tags |
---|---|
http://secunia.com/advisories/26982 | third party advisory |
http://www.securityfocus.com/bid/23872 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/32284 | vdb entry |
http://security.gentoo.org/glsa/glsa-200805-13.xml | vendor advisory |
http://secunia.com/advisories/30168 | third party advisory |
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=225491 | |
http://security.gentoo.org/glsa/glsa-200709-17.xml | vendor advisory |
http://www.vupen.com/english/advisories/2007/1706 | vdb entry |
http://www.mandriva.com/security/advisories?name=MDKSA-2007:109 | vendor advisory |
http://security.gentoo.org/glsa/glsa-200711-34.xml | vendor advisory |
https://issues.rpath.com/browse/RPL-1036 |