Vulnerability Name: | CVE-2019-1010238 (CCN-164023) | ||||||||||||||||||||||||
Assigned: | 2019-07-13 | ||||||||||||||||||||||||
Published: | 2019-07-13 | ||||||||||||||||||||||||
Updated: | 2022-04-12 | ||||||||||||||||||||||||
Summary: | Gnome Pango 1.42 and later is affected by: Buffer Overflow. The impact is: The heap based buffer overflow can be used to get code execution. The component is: function name: pango_log2vis_get_embedding_levels, assignment of nchars and the loop condition. The attack vector is: Bug can be used when application pass invalid utf-8 strings to functions like pango_itemize. | ||||||||||||||||||||||||
CVSS v3 Severity: | 9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 8.5 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
8.5 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
8.5 High (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||||||
Vulnerability Type: | CWE-787 CWE-119 | ||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2019-1010238 Source: REDHAT Type: Third Party Advisory RHBA-2019:2824 Source: REDHAT Type: Third Party Advisory RHSA-2019:2571 Source: REDHAT Type: Third Party Advisory RHSA-2019:2582 Source: REDHAT Type: Third Party Advisory RHSA-2019:2594 Source: REDHAT Type: Third Party Advisory RHSA-2019:3234 Source: XF Type: UNKNOWN gnome-pango-cve20191010238-bo(164023) Source: MISC Type: Patch, Vendor Advisory https://gitlab.gnome.org/GNOME/pango/-/commits/main/pango/pango-bidi-type.c Source: MISC Type: Exploit, Issue Tracking, Vendor Advisory https://gitlab.gnome.org/GNOME/pango/-/issues/342 Source: CCN Type: Pango GIT Repository Gnome Pango Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2019-547be4a683 Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2019-155e34df5a Source: BUGTRAQ Type: Mailing List, Third Party Advisory 20190812 [SECURITY] [DSA 4496-1] pango1.0 security update Source: GENTOO Type: Third Party Advisory GLSA-201909-03 Source: UBUNTU Type: Third Party Advisory USN-4081-1 Source: DEBIAN Type: Third Party Advisory DSA-4496 Source: CCN Type: Oracle CPUApr2020 Oracle Critical Patch Update Advisory - April 2020 Source: N/A Type: Patch, Third Party Advisory N/A | ||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration 4: Configuration 5: Configuration 6: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration RedHat 4: Configuration RedHat 5: Configuration RedHat 6: Configuration RedHat 7: Denotes that component is vulnerable | ||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||
| |||||||||||||||||||||||||
BACK |