Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
CVE-2011-0020
CVE information
Published
Last Modified
CVSSv2.0 Severity
Impact Analysis
Description
Heap-based buffer overflow in the pango_ft2_font_render_box_glyph function in pango/pangoft2-render.c in libpango in Pango 1.28.3 and earlier, when the FreeType2 backend is enabled, allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file, related to the glyph box for an FT_Bitmap object..
CVSSv2.0 Score
- Severity
- High
- Base Score
- 7.6/10
- Exploit Score
- 4.9/10
- Access Vector
- Network
- Access Complexity
- High
- Authentication Required
- None
- Impact Score
- 10/10
- Confidentiality Impact
- Complete
- Availability Impact
- Complete
- Integrity Impact
- Complete
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:a:pango:pango:1.7:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:pango:pango:1.5:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:pango:pango:1.6:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:pango:pango:1.17:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:pango:pango:0.23:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:pango:pango:1.9:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:pango:pango:1.11:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:pango:pango:0.22:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:pango:pango:1.14:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:pango:pango:1.21:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:pango:pango:1.27:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:pango:pango:1.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:pango:pango:1.26:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:pango:pango:1.16:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:pango:pango:0.24:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:pango:pango:1.8:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:pango:pango:0.25:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:pango:pango:1.4:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:pango:pango:1.24:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:pango:pango:1.19:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:pango:pango:1.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:pango:pango:1.15:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:pango:pango:1.25:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:pango:pango:1.10:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:pango:pango:1.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:pango:pango:1.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:pango:pango:1.22:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:pango:pango:1.18:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:pango:pango:0.21:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:pango:pango:0.26:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:pango:pango:0.20:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:pango:pango:1.12:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:pango:pango:1.13:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:pango:pango:1.23:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:pango:pango:1.20:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:gnome:pango:*:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:gnome:pango:1.28.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:gnome:pango:1.28.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:gnome:pango:1.28.1:*:*:*:*:*:*:* |
Yes
|
- | - |
References
- http://www.vupen.com/english/advisories/2011/0186
- https://bugzilla.redhat.com/show_bug.cgi?id=671122
- https://bugs.launchpad.net/ubuntu/+source/pango1.0/+bug/696616
- http://openwall.com/lists/oss-security/2011/01/18/6
- http://openwall.com/lists/oss-security/2011/01/20/2
- http://www.securityfocus.com/bid/45842
- http://osvdb.org/70596
- http://www.redhat.com/support/errata/RHSA-2011-0180.html
- http://www.securitytracker.com/id?1024994
- http://secunia.com/advisories/43100
- http://www.vupen.com/english/advisories/2011/0238
- http://secunia.com/advisories/42934
- https://bugzilla.gnome.org/show_bug.cgi?id=639882
- http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/64832