First published: Fri Feb 18 2011(Updated: )
It was discovered that pango did not check for memory reallocation failures in hb_buffer_ensure() function. This could trigger a NULL pointer dereference in hb_buffer_add_glyph(), where possibly untrusted input is used as an index used for accessing members of the incorrectly reallocated array, resulting in the use of NULL address as the base array address. This can result in application crash or, possibly, code execution. It was demonstrated that it's possible to trigger this flaw in Firefox via a specially crafted web page. Mozilla bug report (currently not public): <a href="https://bugzilla.mozilla.org/show_bug.cgi?id=606997">https://bugzilla.mozilla.org/show_bug.cgi?id=606997</a> Fix in the harfbuzz git: <a href="http://cgit.freedesktop.org/harfbuzz/commit/?id=a6a79df5fe2e">http://cgit.freedesktop.org/harfbuzz/commit/?id=a6a79df5fe2e</a> Acknowledgements: Red Hat would like to thank Mozilla Security Team for reporting this issue.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox | ||
Gnome Pango | =1.28.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.