ID:

CVE-2009-1194 (NVD)

- Vulnerability Info (edit)
2009-05-11

Integer overflow in the pango_glyph_string_set_size function in pango/glyphstring.c in Pango before 1.24 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long glyph string that triggers a heap-based buffer overflow, as demonstrated by a long document.location value in Firefox.

Products Pango
Type Numeric Errors (CWE-189)
First patch http://github.com/bratsche/pango/commit/4de30e5500eaeb49f4bf0b7a07f718e149a2ed5e
Relevant file/s ./pango/glyphstring.c (modified, +20, -6)
Links http://www.openwall.com/lists/oss-security/2009/05/07/1
http://www.vupen.com/english/advisories/2009/1972
https://bugzilla.redhat.com/show_bug.cgi?id=496887
http://www.vupen.com/english/advisories/2009/1269
http://www.redhat.com/support/errata/RHSA-2009-0476.html
Annotation

Note:

This entry has not been annotated yet.

Please consider adding data:

pango - Tree: 4de30e5500

(? files)

Filter Settings
Files
Navigation
Patch data:

(on by default)


Patched area: