Vulnerability identifier: #VU15378
Vulnerability risk: High
CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2018-17407
CWE-ID:
CWE-120
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
texlive
Client/Desktop applications /
Other client software
Vendor: TeX Users Group
Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to buffer overflow when handling of Type 1 fonts by the t1_check_unusual_charstring functions, as defined in the writet1.c source code file. A remote unauthenticated attacker can trick the victim into loading a file that submits malicious Type 1 fonts to the targeted system with the pdflatex, pdftex, dvips, or luatex tools, trigger memory corruption and execute arbitrary code with elevated privileges.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Mitigation
Install update from vendor's website.
Vulnerable software versions
texlive: 2007.0 - 2018.0414
External links
https://github.com/TeX-Live/texlive-source/commit/6ed0077520e2b0da1fd060c7f88db7b2e6068e4c
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.