CVE-2006-4811

Integer overflow in Qt 3.3 before 3.3.7, 4.1 before 4.1.5, and 4.2 before 4.2.1, as used in the KDE khtml library, kdelibs 3.1.3, and possibly other packages, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted pixmap image.
References
Link Resource
ftp://patches.sgi.com/support/free/security/advisories/20061002-01-P
ftp://patches.sgi.com/support/free/security/advisories/20061101-01-P
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=210742
http://lists.suse.com/archive/suse-security-announce/2006-Oct/0006.html
http://secunia.com/advisories/22380 Patch Vendor Advisory
http://secunia.com/advisories/22397 Vendor Advisory
http://secunia.com/advisories/22479 Patch Vendor Advisory
http://secunia.com/advisories/22485 Patch Vendor Advisory
http://secunia.com/advisories/22492 Patch Vendor Advisory
http://secunia.com/advisories/22520 Patch Vendor Advisory
http://secunia.com/advisories/22579 Vendor Advisory
http://secunia.com/advisories/22586 Vendor Advisory
http://secunia.com/advisories/22589 Vendor Advisory
http://secunia.com/advisories/22645 Vendor Advisory
http://secunia.com/advisories/22738 Vendor Advisory
http://secunia.com/advisories/22890 Vendor Advisory
http://secunia.com/advisories/22929 Vendor Advisory
http://secunia.com/advisories/24347 Vendor Advisory
http://security.gentoo.org/glsa/glsa-200611-02.xml
http://security.gentoo.org/glsa/glsa-200703-06.xml
http://securitytracker.com/id?1017084
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.483634
http://www.mandriva.com/security/advisories?name=MDKSA-2006:186
http://www.mandriva.com/security/advisories?name=MDKSA-2006:187
http://www.redhat.com/support/errata/RHSA-2006-0720.html Patch Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2006-0725.html Vendor Advisory
http://www.securityfocus.com/archive/1/449173/100/0/threaded
http://www.securityfocus.com/bid/20599
http://www.trolltech.com/company/newsroom/announcements/press.2006-10-19.5434451733
http://www.ubuntu.com/usn/usn-368-1 Patch
http://www.us.debian.org/security/2006/dsa-1200
http://www.vupen.com/english/advisories/2006/4099 Vendor Advisory
https://issues.rpath.com/browse/RPL-723
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10218
ftp://patches.sgi.com/support/free/security/advisories/20061002-01-P
ftp://patches.sgi.com/support/free/security/advisories/20061101-01-P
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=210742
http://lists.suse.com/archive/suse-security-announce/2006-Oct/0006.html
http://secunia.com/advisories/22380 Patch Vendor Advisory
http://secunia.com/advisories/22397 Vendor Advisory
http://secunia.com/advisories/22479 Patch Vendor Advisory
http://secunia.com/advisories/22485 Patch Vendor Advisory
http://secunia.com/advisories/22492 Patch Vendor Advisory
http://secunia.com/advisories/22520 Patch Vendor Advisory
http://secunia.com/advisories/22579 Vendor Advisory
http://secunia.com/advisories/22586 Vendor Advisory
http://secunia.com/advisories/22589 Vendor Advisory
http://secunia.com/advisories/22645 Vendor Advisory
http://secunia.com/advisories/22738 Vendor Advisory
http://secunia.com/advisories/22890 Vendor Advisory
http://secunia.com/advisories/22929 Vendor Advisory
http://secunia.com/advisories/24347 Vendor Advisory
http://security.gentoo.org/glsa/glsa-200611-02.xml
http://security.gentoo.org/glsa/glsa-200703-06.xml
http://securitytracker.com/id?1017084
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.483634
http://www.mandriva.com/security/advisories?name=MDKSA-2006:186
http://www.mandriva.com/security/advisories?name=MDKSA-2006:187
http://www.redhat.com/support/errata/RHSA-2006-0720.html Patch Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2006-0725.html Vendor Advisory
http://www.securityfocus.com/archive/1/449173/100/0/threaded
http://www.securityfocus.com/bid/20599
http://www.trolltech.com/company/newsroom/announcements/press.2006-10-19.5434451733
http://www.ubuntu.com/usn/usn-368-1 Patch
http://www.us.debian.org/security/2006/dsa-1200
http://www.vupen.com/english/advisories/2006/4099 Vendor Advisory
https://issues.rpath.com/browse/RPL-723
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10218
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:qt:qt:3.3.0:*:*:*:*:*:*:*
cpe:2.3:a:qt:qt:3.3.1:*:*:*:*:*:*:*
cpe:2.3:a:qt:qt:3.3.2:*:*:*:*:*:*:*
cpe:2.3:a:qt:qt:3.3.3:*:*:*:*:*:*:*
cpe:2.3:a:qt:qt:3.3.4:*:*:*:*:*:*:*
cpe:2.3:a:qt:qt:3.3.5:*:*:*:*:*:*:*
cpe:2.3:a:qt:qt:3.3.6:*:*:*:*:*:*:*
cpe:2.3:a:qt:qt:4.1.0:*:*:*:*:*:*:*
cpe:2.3:a:qt:qt:4.1.1:*:*:*:*:*:*:*
cpe:2.3:a:qt:qt:4.1.2:*:*:*:*:*:*:*
cpe:2.3:a:qt:qt:4.1.3:*:*:*:*:*:*:*
cpe:2.3:a:qt:qt:4.1.4:*:*:*:*:*:*:*
cpe:2.3:a:qt:qt:4.2.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:kdelibs:3.1.3:*:*:*:*:*:*:*

History

21 Nov 2024, 00:16

Type Values Removed Values Added
References () ftp://patches.sgi.com/support/free/security/advisories/20061002-01-P - () ftp://patches.sgi.com/support/free/security/advisories/20061002-01-P -
References () ftp://patches.sgi.com/support/free/security/advisories/20061101-01-P - () ftp://patches.sgi.com/support/free/security/advisories/20061101-01-P -
References () http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=210742 - () http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=210742 -
References () http://lists.suse.com/archive/suse-security-announce/2006-Oct/0006.html - () http://lists.suse.com/archive/suse-security-announce/2006-Oct/0006.html -
References () http://secunia.com/advisories/22380 - Patch, Vendor Advisory () http://secunia.com/advisories/22380 - Patch, Vendor Advisory
References () http://secunia.com/advisories/22397 - Vendor Advisory () http://secunia.com/advisories/22397 - Vendor Advisory
References () http://secunia.com/advisories/22479 - Patch, Vendor Advisory () http://secunia.com/advisories/22479 - Patch, Vendor Advisory
References () http://secunia.com/advisories/22485 - Patch, Vendor Advisory () http://secunia.com/advisories/22485 - Patch, Vendor Advisory
References () http://secunia.com/advisories/22492 - Patch, Vendor Advisory () http://secunia.com/advisories/22492 - Patch, Vendor Advisory
References () http://secunia.com/advisories/22520 - Patch, Vendor Advisory () http://secunia.com/advisories/22520 - Patch, Vendor Advisory
References () http://secunia.com/advisories/22579 - Vendor Advisory () http://secunia.com/advisories/22579 - Vendor Advisory
References () http://secunia.com/advisories/22586 - Vendor Advisory () http://secunia.com/advisories/22586 - Vendor Advisory
References () http://secunia.com/advisories/22589 - Vendor Advisory () http://secunia.com/advisories/22589 - Vendor Advisory
References () http://secunia.com/advisories/22645 - Vendor Advisory () http://secunia.com/advisories/22645 - Vendor Advisory
References () http://secunia.com/advisories/22738 - Vendor Advisory () http://secunia.com/advisories/22738 - Vendor Advisory
References () http://secunia.com/advisories/22890 - Vendor Advisory () http://secunia.com/advisories/22890 - Vendor Advisory
References () http://secunia.com/advisories/22929 - Vendor Advisory () http://secunia.com/advisories/22929 - Vendor Advisory
References () http://secunia.com/advisories/24347 - Vendor Advisory () http://secunia.com/advisories/24347 - Vendor Advisory
References () http://security.gentoo.org/glsa/glsa-200611-02.xml - () http://security.gentoo.org/glsa/glsa-200611-02.xml -
References () http://security.gentoo.org/glsa/glsa-200703-06.xml - () http://security.gentoo.org/glsa/glsa-200703-06.xml -
References () http://securitytracker.com/id?1017084 - () http://securitytracker.com/id?1017084 -
References () http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.483634 - () http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.483634 -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2006:186 - () http://www.mandriva.com/security/advisories?name=MDKSA-2006:186 -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2006:187 - () http://www.mandriva.com/security/advisories?name=MDKSA-2006:187 -
References () http://www.redhat.com/support/errata/RHSA-2006-0720.html - Patch, Vendor Advisory () http://www.redhat.com/support/errata/RHSA-2006-0720.html - Patch, Vendor Advisory
References () http://www.redhat.com/support/errata/RHSA-2006-0725.html - Vendor Advisory () http://www.redhat.com/support/errata/RHSA-2006-0725.html - Vendor Advisory
References () http://www.securityfocus.com/archive/1/449173/100/0/threaded - () http://www.securityfocus.com/archive/1/449173/100/0/threaded -
References () http://www.securityfocus.com/bid/20599 - () http://www.securityfocus.com/bid/20599 -
References () http://www.trolltech.com/company/newsroom/announcements/press.2006-10-19.5434451733 - () http://www.trolltech.com/company/newsroom/announcements/press.2006-10-19.5434451733 -
References () http://www.ubuntu.com/usn/usn-368-1 - Patch () http://www.ubuntu.com/usn/usn-368-1 - Patch
References () http://www.us.debian.org/security/2006/dsa-1200 - () http://www.us.debian.org/security/2006/dsa-1200 -
References () http://www.vupen.com/english/advisories/2006/4099 - Vendor Advisory () http://www.vupen.com/english/advisories/2006/4099 - Vendor Advisory
References () https://issues.rpath.com/browse/RPL-723 - () https://issues.rpath.com/browse/RPL-723 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10218 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10218 -

Information

Published : 2006-10-18 17:07

Updated : 2024-11-21 00:16


NVD link : CVE-2006-4811

Mitre link : CVE-2006-4811

CVE.ORG link : CVE-2006-4811


JSON object : View

Products Affected

redhat

  • kdelibs

qt

  • qt
CWE
CWE-189

Numeric Errors