exploit-db-mirror/platforms/linux/remote/35232.txt
Offensive Security da2dbbdc68 Updated 11_15_2014
2014-11-15 04:45:59 +00:00

7 lines
343 B
Text
Executable file

source: http://www.securityfocus.com/bid/45842/info
Pango is prone to a remote heap-corruption vulnerability.
An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition.
http://www.exploit-db.com/sploits/35232.zip