Source: mathtex
Version: 1.03-2
Severity: important
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>

Hi,

The following vulnerabilities were published for mathtex.

CVE-2023-51885[0]:
| Buffer Overflow vulnerability in Mathtex v.1.05 and before allows a
| remote attacker to execute arbitrary code via the length of the
| LaTeX string component.


CVE-2023-51886[1]:
| Buffer Overflow vulnerability in the main() function in Mathtex 1.05
| and before allows a remote attacker to cause a denial of service
| when using \convertpath.


CVE-2023-51887[2]:
| Command Injection vulnerability in Mathtex v.1.05 and before allows
| a remote attacker to execute arbitrary code via crafted string in
| application URL.


CVE-2023-51888[3]:
| Buffer Overflow vulnerability in the nomath() function in Mathtex
| v.1.05 and before allows a remote attacker to cause a denial of
| service via a crafted string in the application URL.


CVE-2023-51889[4]:
| Stack Overflow vulnerability in the validate() function in Mathtex
| v.1.05 and before allows a remote attacker to execute arbitrary code
| via crafted string in the application URL.


CVE-2023-51890[5]:
| An infinite loop issue discovered in Mathtex 1.05 and before allows
| a remote attackers to consume CPU resources via crafted string in
| the application URL.

[6] contains the "fuzzing mathtex" report.

If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-51885
    https://www.cve.org/CVERecord?id=CVE-2023-51885
[1] https://security-tracker.debian.org/tracker/CVE-2023-51886
    https://www.cve.org/CVERecord?id=CVE-2023-51886
[2] https://security-tracker.debian.org/tracker/CVE-2023-51887
    https://www.cve.org/CVERecord?id=CVE-2023-51887
[3] https://security-tracker.debian.org/tracker/CVE-2023-51888
    https://www.cve.org/CVERecord?id=CVE-2023-51888
[4] https://security-tracker.debian.org/tracker/CVE-2023-51889
    https://www.cve.org/CVERecord?id=CVE-2023-51889
[5] https://security-tracker.debian.org/tracker/CVE-2023-51890
    https://www.cve.org/CVERecord?id=CVE-2023-51890
[6] https://blog.yulun.ac.cn/posts/2023/fuzzing-mathtex/

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to