Fedora 14 : pango-1.28.1-5.fc14 (2011-3194)

medium Nessus Plugin ID 52696

Synopsis

The remote Fedora host is missing a security update.

Description

It was discovered that pango did not check for memory reallocation failures in hb_buffer_ensure() function. This could trigger a NULL pointer dereference in hb_buffer_add_glyph(), where possibly untrusted input is used as an index used for accessing members of the incorrectly reallocated array, resulting in the use of NULL address as the base array address. This can result in application crash or, possibly, code execution.

It was demonstrated that it's possible to trigger this flaw in Firefox via a specially crafted web page.

Mozilla bug report (currently not public):
https://bugzilla.mozilla.org/show_bug.cgi?id=606997

Fix in the harfbuzz git:
http://cgit.freedesktop.org/harfbuzz/commit/?id=a6a79df5fe2e

Acknowledgements :

Red Hat would like to thank Mozilla Security Team for reporting this issue.

Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.

Solution

Update the affected pango package.

See Also

https://cgit.freedesktop.org/harfbuzz/commit/?id=a6a79df5fe2e

https://bugzilla.mozilla.org/show_bug.cgi?id=606997

https://bugzilla.redhat.com/show_bug.cgi?id=678563

http://www.nessus.org/u?b33a0389

Plugin Details

Severity: Medium

ID: 52696

File Name: fedora_2011-3194.nasl

Version: 1.13

Type: local

Agent: unix

Published: 3/17/2011

Updated: 1/11/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:fedoraproject:fedora:pango, cpe:/o:fedoraproject:fedora:14

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 3/12/2011

Reference Information

CVE: CVE-2011-0064

BID: 46632

FEDORA: 2011-3194