Buffer overflow in the open_sty function in mkind.c for makeindex 2.14 in teTeX might allow user-assisted remote attackers to overwrite files and possibly execute arbitrary code via a long filename. NOTE: other overflows exist but might not be exploitable, such as a heap-based overflow in the check_idx function.
https://issues.rpath.com/browse/RPL-1036
https://exchange.xforce.ibmcloud.com/vulnerabilities/32284
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=225491
http://www.vupen.com/english/advisories/2007/1706
http://www.securityfocus.com/bid/23872
http://www.mandriva.com/security/advisories?name=MDKSA-2007:109
http://security.gentoo.org/glsa/glsa-200805-13.xml
http://security.gentoo.org/glsa/glsa-200711-34.xml
http://security.gentoo.org/glsa/glsa-200709-17.xml