First published: Fri Feb 18 2011(Updated: )
It was discovered that pango did not check for memory reallocation failures in hb_buffer_ensure() function. This could trigger a NULL pointer dereference in hb_buffer_add_glyph(), where possibly untrusted input is used as an index used for accessing members of the incorrectly reallocated array, resulting in the use of NULL address as the base array address. This can result in application crash or, possibly, code execution. It was demonstrated that it's possible to trigger this flaw in Firefox via a specially crafted web page. Mozilla bug report (currently not public): <a href="https://bugzilla.mozilla.org/show_bug.cgi?id=606997">https://bugzilla.mozilla.org/show_bug.cgi?id=606997</a> Fix in the harfbuzz git: <a href="http://cgit.freedesktop.org/harfbuzz/commit/?id=a6a79df5fe2e">http://cgit.freedesktop.org/harfbuzz/commit/?id=a6a79df5fe2e</a> Acknowledgements: Red Hat would like to thank Mozilla Security Team for reporting this issue.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox and Thunderbird | ||
GNOME Pango | =1.28.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-0064 is classified as a moderate severity vulnerability due to the potential for a NULL pointer dereference.
To fix CVE-2011-0064, update your Pango library to a version that contains the patch addressing memory reallocation failure.
CVE-2011-0064 affects versions of Mozilla Firefox and Pango version 1.28.3.
The CVE-2011-0064 vulnerability is caused by the lack of memory reallocation failure checks in the hb_buffer_ensure() function.
Yes, CVE-2011-0064 can be triggered by possibly untrusted input being used as an index in a dereferenced array.