CVE编号
CVE-2009-1194利用情况
暂无补丁情况
官方补丁披露时间
2009-05-12漏洞描述
在1.24之前的Pango中的pango / glyphstring.c中的pango_glyph_string_set_size函数中的整数溢出允许依赖于上下文的攻击者导致拒绝服务(应用程序崩溃)或者可能通过触发基于堆的缓冲区溢出的长字形字符串执行任意代码,正如Firefox中的long document.location值所示。解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
http://github.com/bratsche/pango/commit/4de30e5500eaeb49f4bf0b7a07f718e149a2ed5e | |
http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html | |
http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00005.html | |
http://lists.opensuse.org/opensuse-security-announce/2009-08/msg00002.html | |
http://osvdb.org/54279 | |
http://secunia.com/advisories/35018 | |
http://secunia.com/advisories/35021 | |
http://secunia.com/advisories/35027 | |
http://secunia.com/advisories/35038 | |
http://secunia.com/advisories/35685 | |
http://secunia.com/advisories/35914 | |
http://secunia.com/advisories/36005 | |
http://secunia.com/advisories/36145 | |
http://sunsolve.sun.com/search/document.do?assetkey=1-66-264308-1 | |
http://www.debian.org/security/2009/dsa-1798 | |
http://www.mozilla.org/security/announce/2009/mfsa2009-36.html | |
http://www.ocert.org/advisories/ocert-2009-001.html | |
http://www.openwall.com/lists/oss-security/2009/05/07/1 | |
http://www.redhat.com/support/errata/RHSA-2009-0476.html | |
http://www.securityfocus.com/archive/1/503349/100/0/threaded | |
http://www.securityfocus.com/bid/34870 | |
http://www.securityfocus.com/bid/35758 | |
http://www.securitytracker.com/id?1022196 | |
http://www.ubuntu.com/usn/USN-773-1 | |
http://www.vupen.com/english/advisories/2009/1269 | |
http://www.vupen.com/english/advisories/2009/1972 | |
https://bugzilla.mozilla.org/show_bug.cgi?id=480134 | |
https://bugzilla.redhat.com/show_bug.cgi?id=496887 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/50397 | |
https://launchpad.net/bugs/cve/2009-1194 | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova... |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | pango | pango | * |
Up to (including) 1.22 |
|||||
运行在以下环境 | |||||||||
应用 | pango | pango | 1.10 | - | |||||
运行在以下环境 | |||||||||
应用 | pango | pango | 1.12 | - | |||||
运行在以下环境 | |||||||||
应用 | pango | pango | 1.14 | - | |||||
运行在以下环境 | |||||||||
应用 | pango | pango | 1.16 | - | |||||
运行在以下环境 | |||||||||
应用 | pango | pango | 1.18 | - | |||||
运行在以下环境 | |||||||||
应用 | pango | pango | 1.2 | - | |||||
运行在以下环境 | |||||||||
应用 | pango | pango | 1.20 | - | |||||
运行在以下环境 | |||||||||
应用 | pango | pango | 1.4 | - | |||||
运行在以下环境 | |||||||||
应用 | pango | pango | 1.6 | - | |||||
运行在以下环境 | |||||||||
应用 | pango | pango | 1.8 | - | |||||
运行在以下环境 | |||||||||
系统 | centos_5 | pango1.0 | * |
Up to (excluding) 1.14.9-5.el5.centos |
|||||
运行在以下环境 | |||||||||
系统 | debian_4.0 | pango1.0 | * |
Up to (excluding) 1.14.8-5+etch1 |
|||||
运行在以下环境 | |||||||||
系统 | debian_5.0 | pango1.0 | * |
Up to (excluding) 1.20.5-3+lenny1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_10.3 | pango1.0 | * |
Up to (excluding) 3.0.12-0.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_11.0 | pango1.0 | * |
Up to (excluding) 3.0.12-0.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_11.1 | pango1.0 | * |
Up to (excluding) 3.0.12-0.1.2 |
|||||
运行在以下环境 | |||||||||
系统 | oracle_5 | pango1.0 | * |
Up to (excluding) 1.14.9-5.el5_3 |
|||||
- 攻击路径 本地
- 攻击复杂度 复杂
- 权限要求 普通权限
- 影响范围 全局影响
- EXP成熟度 未验证
- 补丁情况 官方补丁
- 数据保密性 数据泄露
- 数据完整性 无影响
- 服务器危害 服务器失陷
- 全网数量 N/A
还没有评论,来说两句吧...