Linux Security
    Linux Security
    Linux Security

    Debian: 'tetex-bin' Remote command execution

    Date 11 Dec 2002
    3471
    Posted By LinuxSecurity Advisories
    xdvi and dvips call thesystem() function insecurely, which allows a remote attacker toexecute arbitrary commands via cleverly crafted DVI files.
    
    --------------------------------------------------------------------------
    Debian Security Advisory DSA 207-1                     This email address is being protected from spambots. You need JavaScript enabled to view it. 
    https://www.debian.org/security/                             Martin Schulze
    December 11th, 2002                      https://www.debian.org/security/faq
    --------------------------------------------------------------------------
    
    Package        : tetex-bin
    Vulnerability  : arbitrary command execution
    Problem-type   : remote
    Debian-specific: no
    CVE Id         : CAN-2002-0836
    
    The SuSE security team discovered a vulnerability in kpathsea library
    (libkpathsea) which is used by xdvi and dvips.  Both programs call the
    system() function insecurely, which allows a remote attacker to
    execute arbitrary commands via cleverly crafted DVI files.
    
    If dvips is used in a print filter, this allows a local or remote
    attacker with print permission execute arbitrary code as the printer
    user (usually lp).
    
    This problem has been fixed in version 1.0.7+20011202-7.1for the
    current stable distribution (woody), in version 1.0.6-7.3 for the old
    stable distribution (potato) and in version 1.0.7+20021025-4 for the
    unstable distribution (sid).  xdvik-ja and dvipsk-ja are vulnerable as
    well, but link to the kpathsea library dynamically and will
    automatically be fixed after a new libkpathsea is installed.
    
    We recommend that you upgrade your tetex-lib package immediately.
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    
    
    Debian GNU/Linux 2.2 alias potato
    ---------------------------------
    
      Source archives:
    
         https://security.debian.org/pool/updates/main/t/tetex-bin/tetex-bin_1.0.6-7.3.dsc
          Size/MD5 checksum:      681 85d39461d6074e345475974700302ca5
         https://security.debian.org/pool/updates/main/t/tetex-bin/tetex-bin_1.0.6-7.3.diff.gz
          Size/MD5 checksum:    21219 fc56db28dde023dd14b8dfba2c305ed8
         https://security.debian.org/pool/updates/main/t/tetex-bin/tetex-bin_1.0.6.orig.tar.gz
          Size/MD5 checksum:  7991177 6cb0539e028dc2629b59364c336e9f02
    
      Alpha architecture:
    
         https://security.debian.org/pool/updates/main/t/tetex-bin/tetex-bin_1.0.6-7.3_alpha.deb
          Size/MD5 checksum:  3345472 92b942291b77f8bb1c51d47e7e442200
         https://security.debian.org/pool/updates/main/t/tetex-bin/tetex-dev_1.0.6-7.3_alpha.deb
          Size/MD5 checksum:    86086 ffceb41144a78755652b05e62690503a
         https://security.debian.org/pool/updates/main/t/tetex-bin/tetex-lib_1.0.6-7.3_alpha.deb
          Size/MD5 checksum:    46436 9a8301c361af3537ce71b671f290d118
    
      ARM architecture:
    
         https://security.debian.org/pool/updates/main/t/tetex-bin/tetex-bin_1.0.6-7.3_arm.deb
          Size/MD5 checksum:  3128872 a7d4c2fa53e548b25f3eff5260ce0cba
         https://security.debian.org/pool/updates/main/t/tetex-bin/tetex-dev_1.0.6-7.3_arm.deb
          Size/MD5 checksum:    66412 76eea8557db60db134f7e5c69667866e
         https://security.debian.org/pool/updates/main/t/tetex-bin/tetex-lib_1.0.6-7.3_arm.deb
          Size/MD5 checksum:    35326 805f9c77405093e812afac2fb151db44
    
      Intel IA-32 architecture:
    
         https://security.debian.org/pool/updates/main/t/tetex-bin/tetex-bin_1.0.6-7.3_i386.deb
          Size/MD5 checksum:  2656066 7a84a5905bf56c67a0eaf4d4fbd12ffd
         https://security.debian.org/pool/updates/main/t/tetex-bin/tetex-dev_1.0.6-7.3_i386.deb
          Size/MD5 checksum:    63794 262135c0af64616080f10573fb2af29d
         https://security.debian.org/pool/updates/main/t/tetex-bin/tetex-lib_1.0.6-7.3_i386.deb
          Size/MD5 checksum:    33194 4a042dc080fb61834fea8bd3b5c50123
    
      Motorola 680x0 architecture:
    
         https://security.debian.org/pool/updates/main/t/tetex-bin/tetex-bin_1.0.6-7.3_m68k.deb
          Size/MD5 checksum:  2470542 b19ef2ede1a49f823b0ce189f010ed71
         https://security.debian.org/pool/updates/main/t/tetex-bin/tetex-dev_1.0.6-7.3_m68k.deb
          Size/MD5 checksum:    63010 3f1d9c790839a271e8ad3371a062b99e
         https://security.debian.org/pool/updates/main/t/tetex-bin/tetex-lib_1.0.6-7.3_m68k.deb
          Size/MD5 checksum:    33454 6821d66ef900023deb6a125d84f7436a
    
      PowerPC architecture:
    
         https://security.debian.org/pool/updates/main/t/tetex-bin/tetex-bin_1.0.6-7.3_powerpc.deb
          Size/MD5 checksum:  3064800 bb353bcc816dd2addc54c3f723a7314d
         https://security.debian.org/pool/updates/main/t/tetex-bin/tetex-dev_1.0.6-7.3_powerpc.deb
          Size/MD5 checksum:    74960 86fe8df6b1605a76e98ef435a9b4d94d
         https://security.debian.org/pool/updates/main/t/tetex-bin/tetex-lib_1.0.6-7.3_powerpc.deb
          Size/MD5 checksum:    37252 b3c71917f22d84c2bdb97c5b63532e52
    
      Sun Sparc architecture:
    
         https://security.debian.org/pool/updates/main/t/tetex-bin/tetex-bin_1.0.6-7.3_sparc.deb
          Size/MD5 checksum:  3067948 ccbc6c50d89ee3ff1f4b62daf79748e2
         https://security.debian.org/pool/updates/main/t/tetex-bin/tetex-dev_1.0.6-7.3_sparc.deb
          Size/MD5 checksum:    71708 01e2610c8d35a7bab8369e5f3ba1df71
         https://security.debian.org/pool/updates/main/t/tetex-bin/tetex-lib_1.0.6-7.3_sparc.deb
          Size/MD5 checksum:    40442 6cf1c922eada4a22178a853142c91713
    
    
    Debian GNU/Linux 3.0 alias woody
    --------------------------------
    
      Source archives:
    
         https://security.debian.org/pool/updates/main/t/tetex-bin/tetex-bin_1.0.7+20011202-7.1.dsc
          Size/MD5 checksum:      874 8f366565d4f387475f6ef6bb9aa974d7
         https://security.debian.org/pool/updates/main/t/tetex-bin/tetex-bin_1.0.7+20011202-7.1.tar.gz
          Size/MD5 checksum: 10324253 f450e1704d90950f85bb31eefbf2f45e
    
      Alpha architecture:
    
         https://security.debian.org/pool/updates/main/t/tetex-bin/libkpathsea-dev_1.0.7+20011202-7.1_alpha.deb
          Size/MD5 checksum:    84650 d79e3667791a8110019cb2f96c0d0516
         https://security.debian.org/pool/updates/main/t/tetex-bin/libkpathsea3_1.0.7+20011202-7.1_alpha.deb
          Size/MD5 checksum:    52786 db83b6b35fc7b932aaf0e8f59ae7da7a
         https://security.debian.org/pool/updates/main/t/tetex-bin/tetex-bin_1.0.7+20011202-7.1_alpha.deb
          Size/MD5 checksum:  4567604 70774235aa253481147d28d685abbaea
    
      ARM architecture:
    
         https://security.debian.org/pool/updates/main/t/tetex-bin/libkpathsea-dev_1.0.7+20011202-7.1_arm.deb
          Size/MD5 checksum:    65274 90a77d388e36745006ec0aaa6417491d
         https://security.debian.org/pool/updates/main/t/tetex-bin/libkpathsea3_1.0.7+20011202-7.1_arm.deb
          Size/MD5 checksum:    43402 108a54db3c99b58188cdee22b965c005
         https://security.debian.org/pool/updates/main/t/tetex-bin/tetex-bin_1.0.7+20011202-7.1_arm.deb
          Size/MD5 checksum:  3703124 8439e1875463efc76cbf58e37e17a33a
    
      Intel IA-32 architecture:
    
         https://security.debian.org/pool/updates/main/t/tetex-bin/libkpathsea-dev_1.0.7+20011202-7.1_i386.deb
          Size/MD5 checksum:    62628 31a398d458ed0fd5939929f3afcd8e57
         https://security.debian.org/pool/updates/main/t/tetex-bin/libkpathsea3_1.0.7+20011202-7.1_i386.deb
          Size/MD5 checksum:    40500 ade94b526f08f7edb80b7c8126578ad4
         https://security.debian.org/pool/updates/main/t/tetex-bin/tetex-bin_1.0.7+20011202-7.1_i386.deb
          Size/MD5 checksum:  3136836 98eedd394be628b62bf489ccf4ac7288
    
      Intel IA-64 architecture:
    
         https://security.debian.org/pool/updates/main/t/tetex-bin/libkpathsea-dev_1.0.7+20011202-7.1_ia64.deb
          Size/MD5 checksum:    89724 acd2ca69f8c92a269ecb53ac10b428dd
         https://security.debian.org/pool/updates/main/t/tetex-bin/libkpathsea3_1.0.7+20011202-7.1_ia64.deb
          Size/MD5 checksum:    63122 56fb6234748eab1261fe6779cc2bd5f9
         https://security.debian.org/pool/updates/main/t/tetex-bin/tetex-bin_1.0.7+20011202-7.1_ia64.deb
          Size/MD5 checksum:  5597520 b4342bdcba6ea92adfc6fd547246e597
    
      HP Precision architecture:
    
         https://security.debian.org/pool/updates/main/t/tetex-bin/libkpathsea-dev_1.0.7+20011202-7.1_hppa.deb
          Size/MD5 checksum:    79348 686d1ad04aa6d07ebd33622f78d4c0b3
         https://security.debian.org/pool/updates/main/t/tetex-bin/libkpathsea3_1.0.7+20011202-7.1_hppa.deb
          Size/MD5 checksum:    49110 204b2d736e592c19a864e6edbe013db3
         https://security.debian.org/pool/updates/main/t/tetex-bin/tetex-bin_1.0.7+20011202-7.1_hppa.deb
          Size/MD5 checksum:  4105546 a4eda30de5ed51e1c75f979a069b0c67
    
      Motorola 680x0 architecture:
    
         https://security.debian.org/pool/updates/main/t/tetex-bin/libkpathsea-dev_1.0.7+20011202-7.1_m68k.deb
          Size/MD5 checksum:    61940 79ae1c797a94286d2571431a387ed410
         https://security.debian.org/pool/updates/main/t/tetex-bin/libkpathsea3_1.0.7+20011202-7.1_m68k.deb
          Size/MD5 checksum:    41130 0ebbbf434a9981d68aadc166bf8ba264
         https://security.debian.org/pool/updates/main/t/tetex-bin/tetex-bin_1.0.7+20011202-7.1_m68k.deb
          Size/MD5 checksum:  2922476 80cd4093b37cd3f67571d427c270cce7
    
      Big endian MIPS architecture:
    
         https://security.debian.org/pool/updates/main/t/tetex-bin/libkpathsea-dev_1.0.7+20011202-7.1_mips.deb
          Size/MD5 checksum:    75094 05006f5ed906f1a154e2f653a7d43d19
         https://security.debian.org/pool/updates/main/t/tetex-bin/libkpathsea3_1.0.7+20011202-7.1_mips.deb
          Size/MD5 checksum:    42156 71efe3f47f1cfe1fa94bc977832d14b3
         https://security.debian.org/pool/updates/main/t/tetex-bin/tetex-bin_1.0.7+20011202-7.1_mips.deb
          Size/MD5 checksum:  3941092 22b7964938513694d7665c832b234035
    
      Little endian MIPS architecture:
    
         https://security.debian.org/pool/updates/main/t/tetex-bin/libkpathsea-dev_1.0.7+20011202-7.1_mipsel.deb
          Size/MD5 checksum:    74886 833cc732ed934563f5582b652dc4b056
         https://security.debian.org/pool/updates/main/t/tetex-bin/libkpathsea3_1.0.7+20011202-7.1_mipsel.deb
          Size/MD5 checksum:    42350 4e50a31e4f219f53146a7f790bde4747
         https://security.debian.org/pool/updates/main/t/tetex-bin/tetex-bin_1.0.7+20011202-7.1_mipsel.deb
          Size/MD5 checksum:  3899354 17f6313d6073d1557c988e028b5a7bb0
    
      PowerPC architecture:
    
         https://security.debian.org/pool/updates/main/t/tetex-bin/libkpathsea-dev_1.0.7+20011202-7.1_powerpc.deb
          Size/MD5 checksum:    73934 2a6a193f1acb64784473965cc49ac610
         https://security.debian.org/pool/updates/main/t/tetex-bin/libkpathsea3_1.0.7+20011202-7.1_powerpc.deb
          Size/MD5 checksum:    45040 45b3a8a439e7eb68cc87f24ebe81e945
         https://security.debian.org/pool/updates/main/t/tetex-bin/tetex-bin_1.0.7+20011202-7.1_powerpc.deb
          Size/MD5 checksum:  3586312 9fa3b7e4c724db99e0214204b791123e
    
      IBM S/390 architecture:
    
         https://security.debian.org/pool/updates/main/t/tetex-bin/libkpathsea-dev_1.0.7+20011202-7.1_s390.deb
          Size/MD5 checksum:    63928 f45e1a0bd5b9e69a3c8f9db16cd041df
         https://security.debian.org/pool/updates/main/t/tetex-bin/libkpathsea3_1.0.7+20011202-7.1_s390.deb
          Size/MD5 checksum:    43052 489de74e0a77f1269fbd116ddbb922a3
         https://security.debian.org/pool/updates/main/t/tetex-bin/tetex-bin_1.0.7+20011202-7.1_s390.deb
          Size/MD5 checksum:  3383454 3ada8fc381e60370cdf037e817b3978c
    
      Sun Sparc architecture:
    
         https://security.debian.org/pool/updates/main/t/tetex-bin/libkpathsea-dev_1.0.7+20011202-7.1_sparc.deb
          Size/MD5 checksum:    70708 a34f6c87173cb0754e435cfd0040f7d3
         https://security.debian.org/pool/updates/main/t/tetex-bin/libkpathsea3_1.0.7+20011202-7.1_sparc.deb
          Size/MD5 checksum:    48512 e80f52795254d7fc3adac437a0898d97
         https://security.debian.org/pool/updates/main/t/tetex-bin/tetex-bin_1.0.7+20011202-7.1_sparc.deb
          Size/MD5 checksum:  3598374 8b834d6c56cba09cbdb9402f4b263141
    
    
      These files will probably be moved into the stable distribution on
      its next revision.
    
    ---------------------------------------------------------------------------------
    For apt-get: deb  https://security.debian.org/ stable/updates main
    For dpkg-ftp:  ftp://security.debian.org/debian-security dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    Package info: `apt-cache show ' and  https://packages.debian.org/
    
    
    
    

    LinuxSecurity Poll

    'Tis the season of giving! How have you given back to the open-source community?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/49-tis-the-season-of-giving-how-have-you-given-back-to-the-open-source-community?task=poll.vote&format=json
    49
    radio
    [{"id":"171","title":"I've contributed to the development of an open-source project.","votes":"8","type":"x","order":"1","pct":27.59,"resources":[]},{"id":"172","title":"I've reviewed open-source code for security bugs.","votes":"6","type":"x","order":"2","pct":20.69,"resources":[]},{"id":"173","title":"I've made a donation to an open-source project.","votes":"15","type":"x","order":"3","pct":51.72,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

    Please vote first in order to view vote results.


    VIEW MORE POLLS

    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.