Fedora 14 : pango-1.28.1-5.fc14 (2011-3194)

This script is Copyright (C) 2011-2015 Tenable Network Security, Inc.


Synopsis :

The remote Fedora host is missing a security update.

Description :

It was discovered that pango did not check for memory reallocation
failures in hb_buffer_ensure() function. This could trigger a NULL
pointer dereference in hb_buffer_add_glyph(), where possibly untrusted
input is used as an index used for accessing members of the
incorrectly reallocated array, resulting in the use of NULL address as
the base array address. This can result in application crash or,
possibly, code execution.

It was demonstrated that it's possible to trigger this flaw in Firefox
via a specially crafted web page.

Mozilla bug report (currently not public):
https://bugzilla.mozilla.org/show_bug.cgi?id=606997

Fix in the harfbuzz git:
http://cgit.freedesktop.org/harfbuzz/commit/?id=a6a79df5fe2e

Acknowledgements :

Red Hat would like to thank Mozilla Security Team for reporting this
issue.

Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.

See also :

http://cgit.freedesktop.org/harfbuzz/commit/?id=a6a79df5fe2e
https://bugzilla.mozilla.org/show_bug.cgi?id=606997
https://bugzilla.redhat.com/show_bug.cgi?id=678563
http://www.nessus.org/u?b33a0389

Solution :

Update the affected pango package.

Risk factor :

Medium / CVSS Base Score : 6.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 5.9
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false

Family: Fedora Local Security Checks

Nessus Plugin ID: 52696 ()

Bugtraq ID: 46632

CVE ID: CVE-2011-0064

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now