Description
Integer overflow in the pango_glyph_string_set_size function in pango/glyphstring.c in Pango before 1.24 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long glyph string that triggers a heap-based buffer overflow, as demonstrated by a long document.location value in Firefox.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1798-1 | New pango1.0 packages fix arbitrary code execution |
EUVD |
EUVD-2009-1193 | Integer overflow in the pango_glyph_string_set_size function in pango/glyphstring.c in Pango before 1.24 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long glyph string that triggers a heap-based buffer overflow, as demonstrated by a long document.location value in Firefox. |
Ubuntu USN |
USN-773-1 | Pango vulnerability |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T05:04:49.105Z
Reserved: 2009-03-31T00:00:00.000Z
Link: CVE-2009-1194
No data.
Status : Modified
Published: 2009-05-11T15:30:00.377
Modified: 2026-04-23T00:35:47.467
Link: CVE-2009-1194
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Ubuntu USN