ID:

CVE-2009-1194 (NVD)

- Vulnerability Info (edit)
2009-05-11

Integer overflow in the pango_glyph_string_set_size function in pango/glyphstring.c in Pango before 1.24 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long glyph string that triggers a heap-based buffer overflow, as demonstrated by a long document.location value in Firefox.

Products Pango
Type Numeric Errors (CWE-189)
First patch http://github.com/bratsche/pango/commit/4de30e5500eaeb49f4bf0b7a07f718e149a2ed5e
Relevant file/s ./pango/glyphstring.c (modified, +20, -6)
Links http://secunia.com/advisories/35018
https://bugzilla.redhat.com/show_bug.cgi?id=496887
http://www.vupen.com/english/advisories/2009/1972
https://bugzilla.mozilla.org/show_bug.cgi?id=480134
http://www.securityfocus.com/bid/35758
Annotation

Note:

This entry has not been annotated yet.

Please consider adding data:

pango - Tree: 4de30e5500

(? files)

Filter Settings
Files
Navigation
Patch data:

(on by default)


Patched area: