First published: Sat Jun 16 2012(Updated: )
Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Trolltech Qt | <4.7.4 | |
Pango | <1.25.1 | |
Ubuntu | =11.04 | |
Ubuntu | =10.04 | |
Red Hat Enterprise Linux Server | =5.0 | |
Red Hat Enterprise Linux Workstation | =5.0 | |
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Workstation | =6.0 | |
Red Hat Enterprise Linux Desktop | =4.0 | |
Red Hat Enterprise Linux Desktop | =5.0 | |
Red Hat Enterprise Linux Server | =4.0 | |
Red Hat Enterprise Linux Workstation | =4.0 | |
Red Hat Enterprise Linux Server EUS | =6.1 | |
openSUSE | =11.4 | |
openSUSE | =11.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-3193 is classified as a high severity vulnerability due to its potential to cause a denial of service and execute arbitrary code.
To fix CVE-2011-3193, you should update to versions of Qt later than 4.7.4 and Pango later than 1.25.1.
CVE-2011-3193 affects various systems including Qt versions before 4.7.4, Pango versions before 1.25.1, and multiple versions of Red Hat and Ubuntu distributions.
CVE-2011-3193 can be exploited through crafted font files, allowing remote attackers to crash the application or potentially execute arbitrary code.
Yes, patches and updated versions are available for affected software to mitigate the risks posed by CVE-2011-3193.