Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.880997
Category:CentOS Local Security Checks
Title:CentOS Update for frysk CESA-2011:1327 centos4 i386
Summary:The remote host is missing an update for the 'frysk'; package(s) announced via the referenced advisory.
Description:Summary:
The remote host is missing an update for the 'frysk'
package(s) announced via the referenced advisory.

Vulnerability Insight:
frysk is an execution-analysis technology implemented using native Java and
C++. It provides developers and system administrators with the ability to
examine and analyze multi-host, multi-process, and multithreaded systems
while they are running. frysk is released as a Technology Preview for Red
Hat Enterprise Linux 4.

A buffer overflow flaw was found in HarfBuzz, an OpenType text shaping
engine used in the embedded Pango library. If a frysk application were used
to debug or trace a process that uses HarfBuzz while it loaded a
specially-crafted font file, it could cause the application to crash or,
possibly, execute arbitrary code with the privileges of the user running
the application. (CVE-2011-3193)

Users of frysk are advised to upgrade to this updated package, which
contains a backported patch to correct this issue. All running frysk
applications must be restarted for this update to take effect.

Affected Software/OS:
frysk on CentOS 4

Solution:
Please install the updated packages.

CVSS Score:
9.3

CVSS Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2011-3193
BugTraq ID: 49723
http://www.securityfocus.com/bid/49723
http://cgit.freedesktop.org/harfbuzz/commit/src/harfbuzz-gpos.c?id=da2c52abcd75d46929b34cad55c4fb2c8892bc08
http://git.gnome.org/browse/pango/commit/pango/opentype/harfbuzz-gpos.c?id=a7a715480db66148b1f487528887508a7991dcd0
http://www.openwall.com/lists/oss-security/2011/08/22/6
http://www.openwall.com/lists/oss-security/2011/08/24/8
http://www.openwall.com/lists/oss-security/2011/08/25/1
http://www.osvdb.org/75652
RedHat Security Advisories: RHSA-2011:1323
http://rhn.redhat.com/errata/RHSA-2011-1323.html
RedHat Security Advisories: RHSA-2011:1324
http://rhn.redhat.com/errata/RHSA-2011-1324.html
RedHat Security Advisories: RHSA-2011:1325
http://rhn.redhat.com/errata/RHSA-2011-1325.html
RedHat Security Advisories: RHSA-2011:1326
http://rhn.redhat.com/errata/RHSA-2011-1326.html
RedHat Security Advisories: RHSA-2011:1327
http://rhn.redhat.com/errata/RHSA-2011-1327.html
RedHat Security Advisories: RHSA-2011:1328
http://rhn.redhat.com/errata/RHSA-2011-1328.html
http://secunia.com/advisories/41537
http://secunia.com/advisories/46117
http://secunia.com/advisories/46118
http://secunia.com/advisories/46119
http://secunia.com/advisories/46128
http://secunia.com/advisories/46371
http://secunia.com/advisories/46410
http://secunia.com/advisories/49895
SuSE Security Announcement: SUSE-SU-2011:1113 (Google Search)
https://hermes.opensuse.org/messages/12056605
SuSE Security Announcement: openSUSE-SU-2011:1119 (Google Search)
http://lists.opensuse.org/opensuse-updates/2011-10/msg00007.html
SuSE Security Announcement: openSUSE-SU-2011:1120 (Google Search)
http://lists.opensuse.org/opensuse-updates/2011-10/msg00008.html
http://www.ubuntu.com/usn/USN-1504-1
XForce ISS Database: pango-harfbuzz-bo(69991)
https://exchange.xforce.ibmcloud.com/vulnerabilities/69991
CopyrightCopyright (c) 2011 Greenbone Networks GmbH

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2024 E-Soft Inc. All rights reserved.