Executive Summary
Informations | |||
---|---|---|---|
Name | MDVSA-2011:040 | First vendor Publication | 2011-03-03 |
Vendor | Mandriva | Last vendor Modification | 2011-03-03 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 6.8 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
A vulnerability has been found and corrected in pango: It was discovered that pango did not check for memory reallocation failures in hb_buffer_ensure() function. This could trigger a NULL pointer dereference in hb_buffer_add_glyph(), where possibly untrusted input is used as an index used for accessing members of the incorrectly reallocated array, resulting in the use of NULL address as the base array address. This can result in application crash or, possibly, code execution (CVE-2011-1002). The updated packages have been patched to correct this issue. |
Original Source
Url : http://www.mandriva.com/security/advisories?name=MDVSA-2011:040 |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:12564 | |||
Oval ID: | oval:org.mitre.oval:def:12564 | ||
Title: | DSA-2174-1 avahi -- denial of service | ||
Description: | It was discovered that avahi, an implementation of the zeroconf protocol, can be crashed remotely by a single UDP packet, which may result in a denial of service. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2174-1 CVE-2011-1002 | Version: | 5 |
Platform(s): | Debian GNU/Linux 5.0 Debian GNU/Linux 6.0 Debian GNU/kFreeBSD 6.0 | Product(s): | avahi |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:12975 | |||
Oval ID: | oval:org.mitre.oval:def:12975 | ||
Title: | DSA-2178-1 pango1.0 -- NULL pointer dereference | ||
Description: | It was discovered that pango did not check for memory allocation failures, causing a NULL pointer dereference with an adjustable offset. This can lead to application crashes and potentially arbitrary code execution. The oldstable distribution is not affected by this problem. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2178-1 CVE-2011-0064 | Version: | 5 |
Platform(s): | Debian GNU/Linux 6.0 Debian GNU/kFreeBSD 6.0 | Product(s): | pango1.0 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:13691 | |||
Oval ID: | oval:org.mitre.oval:def:13691 | ||
Title: | USN-1082-1 -- pango1.0 vulnerabilities | ||
Description: | Marc Schoenefeld discovered that Pango incorrectly handled certain Glyph Definition tables. If a user were tricked into displaying text with a specially-crafted font, an attacker could cause Pango to crash, resulting in a denial of service. This issue only affected Ubuntu 8.04 LTS and 9.10. Dan Rosenberg discovered that Pango incorrectly handled certain FT_Bitmap objects. If a user were tricked into displaying text with a specially- crafted font, an attacker could cause a denial of service or execute arbitrary code with privileges of the user invoking the program. The default compiler options for affected releases should reduce the vulnerability to a denial of service. It was discovered that Pango incorrectly handled certain memory reallocation failures. If a user were tricked into displaying text in a way that would cause a reallocation failure, an attacker could cause a denial of service or execute arbitrary code with privileges of the user invoking the program. This issue only affected Ubuntu 9.10, 10.04 LTS and 10.10 | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1082-1 CVE-2010-0421 CVE-2011-0020 CVE-2011-0064 | Version: | 5 |
Platform(s): | Ubuntu 8.04 Ubuntu 10.10 Ubuntu 9.10 Ubuntu 10.04 | Product(s): | pango1.0 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:21584 | |||
Oval ID: | oval:org.mitre.oval:def:21584 | ||
Title: | RHSA-2011:0309: pango security update (Critical) | ||
Description: | The hb_buffer_ensure function in hb-buffer.c in HarfBuzz, as used in Pango 1.28.3, Firefox, and other products, does not verify that memory reallocations succeed, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly execute arbitrary code via crafted OpenType font data that triggers use of an incorrect index. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2011:0309-01 CVE-2011-0064 | Version: | 4 |
Platform(s): | Red Hat Enterprise Linux 6 | Product(s): | pango |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:23405 | |||
Oval ID: | oval:org.mitre.oval:def:23405 | ||
Title: | ELSA-2011:0309: pango security update (Critical) | ||
Description: | The hb_buffer_ensure function in hb-buffer.c in HarfBuzz, as used in Pango 1.28.3, Firefox, and other products, does not verify that memory reallocations succeed, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly execute arbitrary code via crafted OpenType font data that triggers use of an incorrect index. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2011:0309-01 CVE-2011-0064 | Version: | 6 |
Platform(s): | Oracle Linux 6 | Product(s): | pango |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:27988 | |||
Oval ID: | oval:org.mitre.oval:def:27988 | ||
Title: | DEPRECATED: ELSA-2011-0309 -- pango security update (critical) | ||
Description: | [1.28.1-3.el6_0.5] - Prevent an integer overflow in hb_buffer_ensure() Related: #679693 [1.28.1-3.el6_0.4] - Check for realloc failures in hb_buffer_ensure() (CVE-2011-0064) | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2011-0309 CVE-2011-0064 | Version: | 4 |
Platform(s): | Oracle Linux 6 | Product(s): | pango |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2012-07-30 | Name : CentOS Update for avahi CESA-2011:0436 centos5 x86_64 File : nvt/gb_CESA-2011_0436_avahi_centos5_x86_64.nasl |
2012-07-09 | Name : RedHat Update for pango RHSA-2011:0309-01 File : nvt/gb_RHSA-2011_0309-01_pango.nasl |
2012-06-06 | Name : RedHat Update for avahi RHSA-2011:0779-01 File : nvt/gb_RHSA-2011_0779-01_avahi.nasl |
2012-02-12 | Name : Gentoo Security Advisory GLSA 201110-17 (avahi) File : nvt/glsa_201110_17.nasl |
2011-09-12 | Name : Fedora Update for avahi FEDORA-2011-11588 File : nvt/gb_fedora_2011_11588_avahi_fc14.nasl |
2011-08-09 | Name : CentOS Update for avahi CESA-2011:0436 centos5 i386 File : nvt/gb_CESA-2011_0436_avahi_centos5_i386.nasl |
2011-05-12 | Name : avahi -- denial of service File : nvt/freebsd_avahi.nasl |
2011-04-19 | Name : RedHat Update for avahi RHSA-2011:0436-01 File : nvt/gb_RHSA-2011_0436-01_avahi.nasl |
2011-03-24 | Name : Fedora Update for pango FEDORA-2011-3194 File : nvt/gb_fedora_2011_3194_pango_fc14.nasl |
2011-03-15 | Name : Ubuntu Update for avahi vulnerability USN-1084-1 File : nvt/gb_ubuntu_USN_1084_1.nasl |
2011-03-09 | Name : Debian Security Advisory DSA 2174-1 (avahi) File : nvt/deb_2174_1.nasl |
2011-03-09 | Name : Debian Security Advisory DSA 2178-1 (pango1.0) File : nvt/deb_2178_1.nasl |
2011-03-07 | Name : Mandriva Update for pango MDVSA-2011:040 (pango) File : nvt/gb_mandriva_MDVSA_2011_040.nasl |
2011-03-07 | Name : Ubuntu Update for pango1.0 vulnerabilities USN-1082-1 File : nvt/gb_ubuntu_USN_1082_1.nasl |
2011-02-28 | Name : Mandriva Update for avahi MDVSA-2011:037 (avahi) File : nvt/gb_mandriva_MDVSA_2011_037.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
71247 | Pango pango/opentype/hb-buffer.c hb_buffer_ensure() Memory Corruption A memory corruption flaw exists in Pango. The 'hb_buffer_ensure()' function in 'pango/opentype/hb-buffer.c' fails to properly check the return value of memory reallocation operations, resulting in memory corruption. With specially crafted OpenType font data, a context-dependent attacker can execute arbitrary code. |
70948 | Avahi avahi-core/socket.c Empty UDP Packet Remote DoS Avahi contains a flaw that may allow a remote denial of service. The issue is triggered when 'avahi-core/socket.c' in 'avahi-daemon' fails to properly handle empty IPv4 or IPv6 UDP packets sent to port 5353, allowing a remote attacker to cause an infinite loop which will trigger a denial of service. |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : suse_11_3_libpango-1_0-0-110301.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : suse_11_3_avahi-110228.nasl - Type : ACT_GATHER_INFO |
2014-05-19 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201405-13.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2011-0309.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2011-0436.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20110519_avahi_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20110412_avahi_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20110301_pango_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2011-10-24 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201110-17.nasl - Type : ACT_GATHER_INFO |
2011-09-12 | Name : The remote Fedora host is missing a security update. File : fedora_2011-11588.nasl - Type : ACT_GATHER_INFO |
2011-05-20 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2011-0779.nasl - Type : ACT_GATHER_INFO |
2011-05-05 | Name : The remote openSUSE host is missing a security update. File : suse_11_2_libpango-1_0-0-110301.nasl - Type : ACT_GATHER_INFO |
2011-05-05 | Name : The remote openSUSE host is missing a security update. File : suse_11_2_avahi-110228.nasl - Type : ACT_GATHER_INFO |
2011-04-15 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2011-0436.nasl - Type : ACT_GATHER_INFO |
2011-04-13 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2011-0436.nasl - Type : ACT_GATHER_INFO |
2011-03-24 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_pango-110301.nasl - Type : ACT_GATHER_INFO |
2011-03-17 | Name : The remote Fedora host is missing a security update. File : fedora_2011-3194.nasl - Type : ACT_GATHER_INFO |
2011-03-15 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_8b986a054dbe11e08b9a02e0184b8d35.nasl - Type : ACT_GATHER_INFO |
2011-03-15 | Name : The remote Fedora host is missing a security update. File : fedora_2011-3033.nasl - Type : ACT_GATHER_INFO |
2011-03-08 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1084-1.nasl - Type : ACT_GATHER_INFO |
2011-03-04 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2011-040.nasl - Type : ACT_GATHER_INFO |
2011-03-03 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1082-1.nasl - Type : ACT_GATHER_INFO |
2011-03-03 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2178.nasl - Type : ACT_GATHER_INFO |
2011-03-02 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2011-0309.nasl - Type : ACT_GATHER_INFO |
2011-03-01 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2174.nasl - Type : ACT_GATHER_INFO |
2011-02-25 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2011-037.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:42:06 |
|