FreeBSD : pango -- integer overflow (4b172278-3f46-11de-becb-001cc0377035)

Medium Nessus Plugin ID 38751


The remote FreeBSD host is missing one or more security-related updates.


oCERT reports :

Pango suffers from a multiplicative integer overflow which may lead to a potentially exploitable, heap overflow depending on the calling conditions.

For example, this vulnerability is remotely reachable in Firefox by creating an overly large document.location value but only results in a process-terminating, allocation error (denial of service).

The affected function is pango_glyph_string_set_size. An overflow check when doubling the size neglects the overflow possible on the subsequent allocation.


Update the affected packages.

See Also

Plugin Details

Severity: Medium

ID: 38751

File Name: freebsd_pkg_4b1722783f4611debecb001cc0377035.nasl

Version: $Revision: 1.16 $

Type: local

Published: 2009/05/13

Modified: 2014/05/20

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 6.8

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:linux-f10-pango, p-cpe:/a:freebsd:freebsd:linux-f8-pango, p-cpe:/a:freebsd:freebsd:linux-pango, p-cpe:/a:freebsd:freebsd:pango, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2009/05/13

Vulnerability Publication Date: 2009/02/22

Reference Information

CVE: CVE-2009-1194

BID: 34870

Secunia: 35021

CWE: 189