Format string error in latex2rtf.sourceforge.net LaTeX2rtf



| Updated: 2020-08-09
Risk High
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2015-8106
CWE-ID CWE-134
Exploitation vector Network
Public exploit N/A
Vulnerable software
LaTeX2rtf
Other software / Other software solutions

Fedora
Operating systems & Components / Operating system

Vendor latex2rtf.sourceforge.net
Fedoraproject

Security Bulletin

This security bulletin contains one high risk vulnerability.

1) Format string error

EUVDB-ID: #VU40343

Risk: High

CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2015-8106

CWE-ID: CWE-134 - Use of Externally-Controlled Format String

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

Format string vulnerability in the CmdKeywords function in funct1.c in latex2rtf before 2.3.10 allows remote attackers to execute arbitrary code via format string specifiers in the keywords command in a crafted TeX file.

Mitigation

Install update from vendor's website.

Vulnerable software versions

LaTeX2rtf: 2.3.8

Fedora: 2.3.8 - 24

CPE2.3 External links

https://lists.fedoraproject.org/pipermail/package-announce/2016-April/181276.html
https://lists.fedoraproject.org/pipermail/package-announce/2016-April/181677.html
https://lists.fedoraproject.org/pipermail/package-announce/2016-April/181725.html
https://www.openwall.com/lists/oss-security/2015/11/16/3
https://bugzilla.redhat.com/show_bug.cgi?id=1282492
https://sourceforge.net/p/latex2rtf/code/1244/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###