CVE-2009-1194 (NVD)

2009-05-11

Integer overflow in the pango_glyph_string_set_size function in pango/glyphstring.c in Pango before 1.24 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long glyph string that triggers a heap-based buffer overflow, as demonstrated by a long document.location value in Firefox.

Products Pango
Type Numeric Errors (CWE-189)
First patch http://github.com/bratsche/pango/commit/4de30e5500eaeb49f4bf0b7a07f718e149a2ed5e
Relevant file/s ./pango/glyphstring.c (modified, +20, -6)
Links http://secunia.com/advisories/35018
http://secunia.com/advisories/35027
http://www.securityfocus.com/archive/1/503349/100/0/threaded
http://www.securitytracker.com/id?1022196
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10137

pango - Tree: 4de30e5500

(? files)

Filter Settings
Files
Navigation
Patch data:

(on by default)


Patched area: