This script is Copyright (C) 2011-2015 Tenable Network Security, Inc.
The remote Fedora host is missing a security update.
It was discovered that pango did not check for memory reallocation
failures in hb_buffer_ensure() function. This could trigger a NULL
pointer dereference in hb_buffer_add_glyph(), where possibly untrusted
input is used as an index used for accessing members of the
incorrectly reallocated array, resulting in the use of NULL address as
the base array address. This can result in application crash or,
possibly, code execution.
It was demonstrated that it's possible to trigger this flaw in Firefox
via a specially crafted web page.
Mozilla bug report (currently not public):
Fix in the harfbuzz git:
Red Hat would like to thank Mozilla Security Team for reporting this
Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.
See also :
Update the affected pango package.
Risk factor :
Medium / CVSS Base Score : 6.8
CVSS Temporal Score : 5.9
Public Exploit Available : false