CVE-2009-1194

Integer overflow in the pango_glyph_string_set_size function in pango/glyphstring.c in Pango before 1.24 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long glyph string that triggers a heap-based buffer overflow, as demonstrated by a long document.location value in Firefox.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.8 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 88%
VendorProductVersion
pangopango
𝑥
≤ 1.22
pangopango
1.2
pangopango
1.4
pangopango
1.6
pangopango
1.8
pangopango
1.10
pangopango
1.12
pangopango
1.14
pangopango
1.16
pangopango
1.18
pangopango
1.20
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
pango1.0
bullseye
1.46.2-3
fixed
bookworm
1.50.12+ds-1
fixed
sid
1.54.0+ds-3
fixed
trixie
1.54.0+ds-3
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
pango1.0
jaunty
not-affected
intrepid
Fixed 1.22.2-0ubuntu1.1
released
hardy
Fixed 1.20.5-0ubuntu1.1
released
dapper
Fixed 1.12.3-0ubuntu3.1
released
Common Weakness Enumeration
References