First published: Tue Apr 21 2009(Updated: )
Integer overflow in the pango_glyph_string_set_size function in pango/glyphstring.c in Pango before 1.24 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long glyph string that triggers a heap-based buffer overflow, as demonstrated by a long document.location value in Firefox.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Pango Pango | =1.6 | |
Pango Pango | =1.14 | |
Pango Pango | =1.16 | |
Pango Pango | =1.8 | |
Pango Pango | =1.4 | |
Pango Pango | <=1.22 | |
Pango Pango | =1.10 | |
Pango Pango | =1.2 | |
Pango Pango | =1.18 | |
Pango Pango | =1.12 | |
Pango Pango | =1.20 | |
redhat/evolution28-pango | <0:1.14.9-11.el4_7 | 0:1.14.9-11.el4_7 |
redhat/pango | <0:1.14.9-5.el5_3 | 0:1.14.9-5.el5_3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.