First published: Tue Apr 21 2009(Updated: )
Integer overflow in the pango_glyph_string_set_size function in pango/glyphstring.c in Pango before 1.24 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long glyph string that triggers a heap-based buffer overflow, as demonstrated by a long document.location value in Firefox.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/evolution28-pango | <0:1.14.9-11.el4_7 | 0:1.14.9-11.el4_7 |
redhat/pango | <0:1.14.9-5.el5_3 | 0:1.14.9-5.el5_3 |
Pango | <=1.22 | |
Pango | =1.2 | |
Pango | =1.4 | |
Pango | =1.6 | |
Pango | =1.8 | |
Pango | =1.10 | |
Pango | =1.12 | |
Pango | =1.14 | |
Pango | =1.16 | |
Pango | =1.18 | |
Pango | =1.20 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2009-1194 is considered high as it can lead to denial of service or potentially arbitrary code execution.
To fix CVE-2009-1194, update to a non-vulnerable version of the Pango library, specifically version 1.24 or later.
CVE-2009-1194 exploits an integer overflow in the pango_glyph_string_set_size function that can trigger a heap-based buffer overflow.
Pango versions prior to 1.24, including 1.2 to 1.22, are affected by CVE-2009-1194.
CVE-2009-1194 could potentially allow remote code execution, making it critical for users to apply updates.