Vulnerability Description
Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gnome | Pango | < 1.25.1 |
| Qt | Qt | < 4.7.4 |
| Canonical | Ubuntu Linux | 10.04 |
| Redhat | Enterprise Linux Desktop | 4.0 |
| Redhat | Enterprise Linux Eus | 6.1 |
| Redhat | Enterprise Linux Server | 4.0 |
| Redhat | Enterprise Linux Workstation | 4.0 |
| Opensuse | Opensuse | 11.3 |
Related Weaknesses (CWE)
References
- http://cgit.freedesktop.org/harfbuzz.old/commit/?id=81c8ef785b079980ad5b46be4fe7PatchThird Party Advisory
- http://cgit.freedesktop.org/harfbuzz/commit/src/harfbuzz-gpos.c?id=da2c52abcd75dPatchThird Party Advisory
- http://git.gnome.org/browse/pango/commit/pango/opentype/harfbuzz-gpos.c?id=a7a71PatchVendor Advisory
- http://lists.opensuse.org/opensuse-updates/2011-10/msg00007.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-updates/2011-10/msg00008.htmlMailing ListThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2011-1323.htmlThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2011-1324.htmlThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2011-1325.htmlThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2011-1326.htmlThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2011-1327.htmlThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2011-1328.htmlThird Party Advisory
- http://secunia.com/advisories/41537Third Party Advisory
- http://secunia.com/advisories/46117Third Party Advisory
- http://secunia.com/advisories/46118Third Party Advisory
- http://secunia.com/advisories/46119Third Party Advisory
FAQ
What is CVE-2011-3193?
CVE-2011-3193 is a vulnerability with a CVSS score of 9.3 (HIGH). Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (cras...
How severe is CVE-2011-3193?
CVE-2011-3193 has been rated HIGH with a CVSS base score of 9.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-3193?
Check the references section above for vendor advisories and patch information. Affected products include: Gnome Pango, Qt Qt, Canonical Ubuntu Linux, Redhat Enterprise Linux Desktop, Redhat Enterprise Linux Eus.