FreeBSD : pango -- integer overflow (4b172278-3f46-11de-becb-001cc0377035)

medium Nessus Plugin ID 38751

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

oCERT reports :

Pango suffers from a multiplicative integer overflow which may lead to a potentially exploitable, heap overflow depending on the calling conditions.

For example, this vulnerability is remotely reachable in Firefox by creating an overly large document.location value but only results in a process-terminating, allocation error (denial of service).

The affected function is pango_glyph_string_set_size. An overflow check when doubling the size neglects the overflow possible on the subsequent allocation.

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?d3167e66

Plugin Details

Severity: Medium

ID: 38751

File Name: freebsd_pkg_4b1722783f4611debecb001cc0377035.nasl

Version: 1.19

Type: local

Published: 5/13/2009

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:linux-f10-pango, p-cpe:/a:freebsd:freebsd:linux-f8-pango, p-cpe:/a:freebsd:freebsd:linux-pango, p-cpe:/a:freebsd:freebsd:pango, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Ease: No known exploits are available

Patch Publication Date: 5/13/2009

Vulnerability Publication Date: 2/22/2009

Reference Information

CVE: CVE-2009-1194

BID: 34870

CWE: 189

Secunia: 35021