CVE-2011-3194

Buffer overflow in the TIFF reader in gui/image/qtiffhandler.cpp in Qt 4.7.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via the TIFFTAG_SAMPLESPERPIXEL tag in a greyscale TIFF image with multiple samples per pixel.
References
Link Resource
http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066209.html
http://lists.opensuse.org/opensuse-updates/2011-10/msg00007.html
http://lists.opensuse.org/opensuse-updates/2011-10/msg00008.html
http://rhn.redhat.com/errata/RHSA-2011-1323.html
http://rhn.redhat.com/errata/RHSA-2011-1328.html
http://secunia.com/advisories/46128 Vendor Advisory
http://secunia.com/advisories/46140 Vendor Advisory
http://secunia.com/advisories/46187 Vendor Advisory
http://secunia.com/advisories/46371 Vendor Advisory
http://secunia.com/advisories/46410 Vendor Advisory
http://secunia.com/advisories/49383 Vendor Advisory
http://secunia.com/advisories/49895 Vendor Advisory
http://security.gentoo.org/glsa/glsa-201206-02.xml
http://www.openwall.com/lists/oss-security/2011/08/22/6
http://www.openwall.com/lists/oss-security/2011/08/24/8
http://www.osvdb.org/75653
http://www.securityfocus.com/bid/49724
http://www.ubuntu.com/usn/USN-1504-1
https://bugzilla.novell.com/show_bug.cgi?id=637275
https://exchange.xforce.ibmcloud.com/vulnerabilities/69975
https://hermes.opensuse.org/messages/12056605
https://qt.gitorious.org/qt/qt/commit/cb6380beb81ab9571c547270c144988781fed465
http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066209.html
http://lists.opensuse.org/opensuse-updates/2011-10/msg00007.html
http://lists.opensuse.org/opensuse-updates/2011-10/msg00008.html
http://rhn.redhat.com/errata/RHSA-2011-1323.html
http://rhn.redhat.com/errata/RHSA-2011-1328.html
http://secunia.com/advisories/46128 Vendor Advisory
http://secunia.com/advisories/46140 Vendor Advisory
http://secunia.com/advisories/46187 Vendor Advisory
http://secunia.com/advisories/46371 Vendor Advisory
http://secunia.com/advisories/46410 Vendor Advisory
http://secunia.com/advisories/49383 Vendor Advisory
http://secunia.com/advisories/49895 Vendor Advisory
http://security.gentoo.org/glsa/glsa-201206-02.xml
http://www.openwall.com/lists/oss-security/2011/08/22/6
http://www.openwall.com/lists/oss-security/2011/08/24/8
http://www.osvdb.org/75653
http://www.securityfocus.com/bid/49724
http://www.ubuntu.com/usn/USN-1504-1
https://bugzilla.novell.com/show_bug.cgi?id=637275
https://exchange.xforce.ibmcloud.com/vulnerabilities/69975
https://hermes.opensuse.org/messages/12056605
https://qt.gitorious.org/qt/qt/commit/cb6380beb81ab9571c547270c144988781fed465
Configurations

Configuration 1 (hide)

cpe:2.3:a:qt:qt:4.7.4:*:*:*:*:*:*:*

History

21 Nov 2024, 01:29

Type Values Removed Values Added
References () http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066209.html - () http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066209.html -
References () http://lists.opensuse.org/opensuse-updates/2011-10/msg00007.html - () http://lists.opensuse.org/opensuse-updates/2011-10/msg00007.html -
References () http://lists.opensuse.org/opensuse-updates/2011-10/msg00008.html - () http://lists.opensuse.org/opensuse-updates/2011-10/msg00008.html -
References () http://rhn.redhat.com/errata/RHSA-2011-1323.html - () http://rhn.redhat.com/errata/RHSA-2011-1323.html -
References () http://rhn.redhat.com/errata/RHSA-2011-1328.html - () http://rhn.redhat.com/errata/RHSA-2011-1328.html -
References () http://secunia.com/advisories/46128 - Vendor Advisory () http://secunia.com/advisories/46128 - Vendor Advisory
References () http://secunia.com/advisories/46140 - Vendor Advisory () http://secunia.com/advisories/46140 - Vendor Advisory
References () http://secunia.com/advisories/46187 - Vendor Advisory () http://secunia.com/advisories/46187 - Vendor Advisory
References () http://secunia.com/advisories/46371 - Vendor Advisory () http://secunia.com/advisories/46371 - Vendor Advisory
References () http://secunia.com/advisories/46410 - Vendor Advisory () http://secunia.com/advisories/46410 - Vendor Advisory
References () http://secunia.com/advisories/49383 - Vendor Advisory () http://secunia.com/advisories/49383 - Vendor Advisory
References () http://secunia.com/advisories/49895 - Vendor Advisory () http://secunia.com/advisories/49895 - Vendor Advisory
References () http://security.gentoo.org/glsa/glsa-201206-02.xml - () http://security.gentoo.org/glsa/glsa-201206-02.xml -
References () http://www.openwall.com/lists/oss-security/2011/08/22/6 - () http://www.openwall.com/lists/oss-security/2011/08/22/6 -
References () http://www.openwall.com/lists/oss-security/2011/08/24/8 - () http://www.openwall.com/lists/oss-security/2011/08/24/8 -
References () http://www.osvdb.org/75653 - () http://www.osvdb.org/75653 -
References () http://www.securityfocus.com/bid/49724 - () http://www.securityfocus.com/bid/49724 -
References () http://www.ubuntu.com/usn/USN-1504-1 - () http://www.ubuntu.com/usn/USN-1504-1 -
References () https://bugzilla.novell.com/show_bug.cgi?id=637275 - () https://bugzilla.novell.com/show_bug.cgi?id=637275 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/69975 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/69975 -
References () https://hermes.opensuse.org/messages/12056605 - () https://hermes.opensuse.org/messages/12056605 -
References () https://qt.gitorious.org/qt/qt/commit/cb6380beb81ab9571c547270c144988781fed465 - () https://qt.gitorious.org/qt/qt/commit/cb6380beb81ab9571c547270c144988781fed465 -

Information

Published : 2012-06-16 00:55

Updated : 2024-11-21 01:29


NVD link : CVE-2011-3194

Mitre link : CVE-2011-3194

CVE.ORG link : CVE-2011-3194


JSON object : View

Products Affected

qt

  • qt
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer