The remote host is missing an update for the 'evolution28-pango' package(s) announced via the referenced advisory. The update resolves a buffer overflow flaw in the HarfBuzz OpenType text shaping engine used in Pango
Reporter | Title | Published | Views | Family All 93 |
---|---|---|---|---|
![]() | Oracle Linux 4 : frysk (ELSA-2011-1327) | 12 Jul 201300:00 | – | nessus |
![]() | RHEL 4 : evolution28-pango (RHSA-2011:1325) | 22 Sep 201100:00 | – | nessus |
![]() | CentOS 4 : frysk (CESA-2011:1327) | 23 Sep 201100:00 | – | nessus |
![]() | CentOS 4 : evolution28-pango (CESA-2011:1325) | 23 Sep 201100:00 | – | nessus |
![]() | Scientific Linux Security Update : evolution28-pango on SL4.x i386/x86_64 | 1 Aug 201200:00 | – | nessus |
![]() | Oracle Linux 5 : pango (ELSA-2011-1326) | 12 Jul 201300:00 | – | nessus |
![]() | RHEL 4 : frysk (RHSA-2011:1327) | 22 Sep 201100:00 | – | nessus |
![]() | Scientific Linux Security Update : pango on SL5.x i386/x86_64 | 1 Aug 201200:00 | – | nessus |
![]() | Scientific Linux Security Update : frysk on SL4.x i386/x86_64 | 1 Aug 201200:00 | – | nessus |
![]() | CentOS 5 : pango (CESA-2011:1326) | 22 Sep 201100:00 | – | nessus |
# SPDX-FileCopyrightText: 2011 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_xref(name:"URL", value:"https://www.redhat.com/archives/rhsa-announce/2011-September/msg00037.html");
script_oid("1.3.6.1.4.1.25623.1.0.870490");
script_tag(name:"cvss_base", value:"9.3");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:C/I:C/A:C");
script_version("2024-03-21T05:06:54+0000");
script_tag(name:"last_modification", value:"2024-03-21 05:06:54 +0000 (Thu, 21 Mar 2024)");
script_tag(name:"creation_date", value:"2011-09-23 16:39:49 +0200 (Fri, 23 Sep 2011)");
script_xref(name:"RHSA", value:"2011:1325-01");
script_cve_id("CVE-2011-3193");
script_name("RedHat Update for evolution28-pango RHSA-2011:1325-01");
script_tag(name:"summary", value:"The remote host is missing an update for the 'evolution28-pango'
package(s) announced via the referenced advisory.");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2011 Greenbone AG");
script_family("Red Hat Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/rhel", "ssh/login/rpms", re:"ssh/login/release=RHENT_4");
script_tag(name:"affected", value:"evolution28-pango on Red Hat Enterprise Linux AS version 4,
Red Hat Enterprise Linux ES version 4,
Red Hat Enterprise Linux WS version 4");
script_tag(name:"solution", value:"Please Install the Updated Packages.");
script_tag(name:"insight", value:"Pango is a library used for the layout and rendering of internationalized
text.
A buffer overflow flaw was found in HarfBuzz, an OpenType text shaping
engine used in Pango. If a user loaded a specially-crafted font file with
an application that uses Pango, it could cause the application to crash or,
possibly, execute arbitrary code with the privileges of the user running
the application. (CVE-2011-3193)
Users of evolution28-pango are advised to upgrade to these updated
packages, which contain a backported patch to resolve this issue. After
installing this update, you must restart your system or restart the X
server for the update to take effect.");
script_tag(name:"qod_type", value:"package");
script_tag(name:"solution_type", value:"VendorFix");
exit(0);
}
include("revisions-lib.inc");
include("pkg-lib-rpm.inc");
release = rpm_get_ssh_release();
if(!release) exit(0);
res = "";
if(release == "RHENT_4")
{
if ((res = isrpmvuln(pkg:"evolution28-pango", rpm:"evolution28-pango~1.14.9~13.el4_11", rls:"RHENT_4")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"evolution28-pango-debuginfo", rpm:"evolution28-pango-debuginfo~1.14.9~13.el4_11", rls:"RHENT_4")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"evolution28-pango-devel", rpm:"evolution28-pango-devel~1.14.9~13.el4_11", rls:"RHENT_4")) != NULL)
{
security_message(data:res);
exit(0);
}
if (__pkg_match) exit(99);
exit(0);
}
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo