Integer overflow in Qt 3.3 before 3.3.7, 4.1 before 4.1.5, and 4.2 before 4.2.1, as used in the KDE khtml library, kdelibs 3.1.3, and possibly other packages, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted pixmap image.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:16
Type | Values Removed | Values Added |
---|---|---|
References | () ftp://patches.sgi.com/support/free/security/advisories/20061002-01-P - | |
References | () ftp://patches.sgi.com/support/free/security/advisories/20061101-01-P - | |
References | () http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=210742 - | |
References | () http://lists.suse.com/archive/suse-security-announce/2006-Oct/0006.html - | |
References | () http://secunia.com/advisories/22380 - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/22397 - Vendor Advisory | |
References | () http://secunia.com/advisories/22479 - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/22485 - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/22492 - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/22520 - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/22579 - Vendor Advisory | |
References | () http://secunia.com/advisories/22586 - Vendor Advisory | |
References | () http://secunia.com/advisories/22589 - Vendor Advisory | |
References | () http://secunia.com/advisories/22645 - Vendor Advisory | |
References | () http://secunia.com/advisories/22738 - Vendor Advisory | |
References | () http://secunia.com/advisories/22890 - Vendor Advisory | |
References | () http://secunia.com/advisories/22929 - Vendor Advisory | |
References | () http://secunia.com/advisories/24347 - Vendor Advisory | |
References | () http://security.gentoo.org/glsa/glsa-200611-02.xml - | |
References | () http://security.gentoo.org/glsa/glsa-200703-06.xml - | |
References | () http://securitytracker.com/id?1017084 - | |
References | () http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.483634 - | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2006:186 - | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2006:187 - | |
References | () http://www.redhat.com/support/errata/RHSA-2006-0720.html - Patch, Vendor Advisory | |
References | () http://www.redhat.com/support/errata/RHSA-2006-0725.html - Vendor Advisory | |
References | () http://www.securityfocus.com/archive/1/449173/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/20599 - | |
References | () http://www.trolltech.com/company/newsroom/announcements/press.2006-10-19.5434451733 - | |
References | () http://www.ubuntu.com/usn/usn-368-1 - Patch | |
References | () http://www.us.debian.org/security/2006/dsa-1200 - | |
References | () http://www.vupen.com/english/advisories/2006/4099 - Vendor Advisory | |
References | () https://issues.rpath.com/browse/RPL-723 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10218 - |
Information
Published : 2006-10-18 17:07
Updated : 2024-11-21 00:16
NVD link : CVE-2006-4811
Mitre link : CVE-2006-4811
CVE.ORG link : CVE-2006-4811
JSON object : View
Products Affected
redhat
- kdelibs
qt
- qt
CWE
CWE-189
Numeric Errors