Bug 64459 (CVE-2004-1293) - VUL-0: CVE-2004-1293: rtf2latex2e buffer overflow in ReadFontTbl
Summary: VUL-0: CVE-2004-1293: rtf2latex2e buffer overflow in ReadFontTbl
Status: RESOLVED FIXED
Alias: CVE-2004-1293
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: All Linux
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Dr. Werner Fink
QA Contact: Security Team bot
URL:
Whiteboard: CVE-2004-1293: CVSS v2 Base Score: 10...
Keywords:
Depends on:
Blocks:
 
Reported: 2004-12-21 22:53 UTC by Marcus Meissner
Modified: 2021-10-27 11:34 UTC (History)
1 user (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments
5.rtf (1.04 KB, text/plain)
2004-12-21 22:54 UTC, Marcus Meissner
Details

Note You need to log in before you can comment on or make changes to this bug.
Description Marcus Meissner 2004-12-21 22:53:20 UTC
From djb@cr.yp.to Wed Dec 15 14:20:26 2004 
Date: 15 Dec 2004 08:12:17 -0000 
From: D. J. Bernstein <djb@cr.yp.to> 
To: securesoftware@list.cr.yp.to, prahl@users.sourceforge.net 
Subject: [remote] [control] rtf2latex2e 1.0fc2 ReadFontTbl overflows buffer 
 
Limin Wang, a student in my Fall 2004 UNIX Security Holes course, has 
discovered a remotely exploitable security hole in rtf2latex2e. I'm 
publishing this notice, but all the discovery credits should be assigned 
to Wang. 
 
You are at risk if you take an RTF document from an email message (or a 
web page or any other source that could be controlled by an attacker) 
and feed it through rtf2latex2e. (The rtf2latex2e documentation does not 
tell users to avoid taking input from the network.) Whoever provides 
that document then has complete control over your account: she can read 
and modify your files, watch the programs you're running, etc. 
 
Proof of concept: On an x86 computer running FreeBSD 4.10, type 
 
   wget 
http://umn.dl.sourceforge.net/sourceforge/rtf2latex2e/rtf2latex2eUnix1.tar.gz 
   gunzip < rtf2latex2eUnix1.tar.gz | tar -xf - 
   cd rtf2latex2eUnix-1.0fc1 
   cd Unix 
   ./configure i386-unknown-freebsd4.10 
   make 
 
to download and compile the rtf2latex2e program, version 1.0fc2 
(current). Then save the file 5.rtf attached to this message, and type 
 
   env RTF2LATEX2E_DIR=`cd ..;pwd` ../rtf2latex2e.bin 5.rtf 
 
with the unauthorized result that all files are removed from the current 
directory. (I tested this with a 552-byte environment, as reported by 
printenv | wc -c.) 
 
Here's the bug: In reader.c, ReadFontTbl() reads any number of bytes 
into a 1024-byte buf[] array. 
 
---D. J. Bernstein, Associate Professor, Department of Mathematics, 
Statistics, and Computer Science, University of Illinois at Chicago 
 
    [ Part 2, Application/RTF  1.2KB. ] 
    [ Unable to print this part. ]
Comment 1 Marcus Meissner 2004-12-21 22:53:20 UTC
<!-- SBZ_reproduce  -->
see aboive
Comment 2 Marcus Meissner 2004-12-21 22:54:27 UTC
Created attachment 27248 [details]
5.rtf
Comment 3 Marcus Meissner 2004-12-21 22:56:27 UTC
======================================================                           
Candidate: CAN-2004-1293                                                         
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1293                 
Reference: MISC:http://tigger.uic.edu/~jlongs2/holes/rtf2latex2e.txt             
                                                                                 
Buffer overflow in the ReadFontTbl function in reader.c for                      
rtf2latex2e 1.0fc2 allows remote attackers to execute arbitrary code             
via a crafted RTF file.                                                          
                                                                                 
Comment 4 Dr. Werner Fink 2004-12-21 23:10:44 UTC
Please could you give me a pointer to the package which
includes rtf2latex2e or rtf2latex. I've found only a rtf2rtf
and this is not owned by tetex. 
Comment 5 Marcus Meissner 2004-12-21 23:14:26 UTC
sorry, i just saw zgrep rtf2latex /mounts/dist/next-ppc/ARCHIVES.gz 
./suse/ppc/tetex.rpm:    -rw-r--r--    1 root    root             2431 Feb  6  
2003 /usr/share/texmf/doc/help/Catalogue/entries/rtf2latex2e.html 
 
 
ignore this entry. 
Comment 6 Thomas Biege 2009-10-13 20:07:55 UTC
CVE-2004-1293: CVSS v2 Base Score: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C)