The remote host is missing an update for the 'frysk' package(s) announced via the referenced advisory. The 'frysk' package on Red Hat Enterprise Linux AS version 4, Red Hat Enterprise Linux ES version 4, Red Hat Enterprise Linux WS version 4 is affected by a buffer overflow flaw in HarfBuzz, which could allow an attacker to execute arbitrary code or crash the application
Reporter | Title | Published | Views | Family All 93 |
---|---|---|---|---|
![]() | Oracle Linux 4 : frysk (ELSA-2011-1327) | 12 Jul 201300:00 | – | nessus |
![]() | RHEL 4 : evolution28-pango (RHSA-2011:1325) | 22 Sep 201100:00 | – | nessus |
![]() | CentOS 4 : frysk (CESA-2011:1327) | 23 Sep 201100:00 | – | nessus |
![]() | CentOS 4 : evolution28-pango (CESA-2011:1325) | 23 Sep 201100:00 | – | nessus |
![]() | Scientific Linux Security Update : evolution28-pango on SL4.x i386/x86_64 | 1 Aug 201200:00 | – | nessus |
![]() | Oracle Linux 5 : pango (ELSA-2011-1326) | 12 Jul 201300:00 | – | nessus |
![]() | RHEL 4 : frysk (RHSA-2011:1327) | 22 Sep 201100:00 | – | nessus |
![]() | Scientific Linux Security Update : pango on SL5.x i386/x86_64 | 1 Aug 201200:00 | – | nessus |
![]() | Scientific Linux Security Update : frysk on SL4.x i386/x86_64 | 1 Aug 201200:00 | – | nessus |
![]() | CentOS 5 : pango (CESA-2011:1326) | 22 Sep 201100:00 | – | nessus |
# SPDX-FileCopyrightText: 2011 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_xref(name:"URL", value:"https://www.redhat.com/archives/rhsa-announce/2011-September/msg00039.html");
script_oid("1.3.6.1.4.1.25623.1.0.870488");
script_tag(name:"cvss_base", value:"9.3");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:C/I:C/A:C");
script_version("2024-03-21T05:06:54+0000");
script_tag(name:"last_modification", value:"2024-03-21 05:06:54 +0000 (Thu, 21 Mar 2024)");
script_tag(name:"creation_date", value:"2011-09-23 16:39:49 +0200 (Fri, 23 Sep 2011)");
script_xref(name:"RHSA", value:"2011:1327-01");
script_cve_id("CVE-2011-3193");
script_name("RedHat Update for frysk RHSA-2011:1327-01");
script_tag(name:"summary", value:"The remote host is missing an update for the 'frysk'
package(s) announced via the referenced advisory.");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2011 Greenbone AG");
script_family("Red Hat Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/rhel", "ssh/login/rpms", re:"ssh/login/release=RHENT_4");
script_tag(name:"affected", value:"frysk on Red Hat Enterprise Linux AS version 4,
Red Hat Enterprise Linux ES version 4,
Red Hat Enterprise Linux WS version 4");
script_tag(name:"solution", value:"Please Install the Updated Packages.");
script_tag(name:"insight", value:"frysk is an execution-analysis technology implemented using native Java and
C++. It provides developers and system administrators with the ability to
examine and analyze multi-host, multi-process, and multithreaded systems
while they are running. frysk is released as a Technology Preview for Red
Hat Enterprise Linux 4.
A buffer overflow flaw was found in HarfBuzz, an OpenType text shaping
engine used in the embedded Pango library. If a frysk application were used
to debug or trace a process that uses HarfBuzz while it loaded a
specially-crafted font file, it could cause the application to crash or,
possibly, execute arbitrary code with the privileges of the user running
the application. (CVE-2011-3193)
Users of frysk are advised to upgrade to this updated package, which
contains a backported patch to correct this issue. All running frysk
applications must be restarted for this update to take effect.");
script_tag(name:"qod_type", value:"package");
script_tag(name:"solution_type", value:"VendorFix");
exit(0);
}
include("revisions-lib.inc");
include("pkg-lib-rpm.inc");
release = rpm_get_ssh_release();
if(!release) exit(0);
res = "";
if(release == "RHENT_4")
{
if ((res = isrpmvuln(pkg:"frysk", rpm:"frysk~0.0.1.2007.08.03~8.el4", rls:"RHENT_4")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"frysk-debuginfo", rpm:"frysk-debuginfo~0.0.1.2007.08.03~8.el4", rls:"RHENT_4")) != NULL)
{
security_message(data:res);
exit(0);
}
if (__pkg_match) exit(99);
exit(0);
}
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo