CVE-2013-4549

QXmlSimpleReader in Qt before 5.2 allows context-dependent attackers to cause a denial of service (memory consumption) via an XML Entity Expansion (XEE) attack.
References
Link Resource
http://blog.qt.digia.com/blog/2014/04/24/qt-4-8-6-released/
http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132395.html
http://lists.opensuse.org/opensuse-updates/2014-01/msg00044.html
http://lists.opensuse.org/opensuse-updates/2014-01/msg00047.html
http://lists.opensuse.org/opensuse-updates/2014-01/msg00085.html
http://lists.opensuse.org/opensuse-updates/2014-01/msg00104.html
http://lists.opensuse.org/opensuse-updates/2014-01/msg00106.html
http://lists.qt-project.org/pipermail/announce/2013-December/000036.html
http://secunia.com/advisories/56008 Vendor Advisory
http://secunia.com/advisories/56166 Vendor Advisory
http://www.ubuntu.com/usn/USN-2057-1
https://codereview.qt-project.org/#change%2C71010
https://codereview.qt-project.org/#change%2C71368
http://blog.qt.digia.com/blog/2014/04/24/qt-4-8-6-released/
http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132395.html
http://lists.opensuse.org/opensuse-updates/2014-01/msg00044.html
http://lists.opensuse.org/opensuse-updates/2014-01/msg00047.html
http://lists.opensuse.org/opensuse-updates/2014-01/msg00085.html
http://lists.opensuse.org/opensuse-updates/2014-01/msg00104.html
http://lists.opensuse.org/opensuse-updates/2014-01/msg00106.html
http://lists.qt-project.org/pipermail/announce/2013-December/000036.html
http://secunia.com/advisories/56008 Vendor Advisory
http://secunia.com/advisories/56166 Vendor Advisory
http://www.ubuntu.com/usn/USN-2057-1
https://codereview.qt-project.org/#change%2C71010
https://codereview.qt-project.org/#change%2C71368
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:digia:qt:*:*:*:*:*:*:*:*
cpe:2.3:a:qt:qt:5.0.0:*:*:*:*:*:*:*
cpe:2.3:a:qt:qt:5.0.1:*:*:*:*:*:*:*
cpe:2.3:a:qt:qt:5.0.2:*:*:*:*:*:*:*

History

21 Nov 2024, 01:55

Type Values Removed Values Added
References () http://blog.qt.digia.com/blog/2014/04/24/qt-4-8-6-released/ - () http://blog.qt.digia.com/blog/2014/04/24/qt-4-8-6-released/ -
References () http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132395.html - () http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132395.html -
References () http://lists.opensuse.org/opensuse-updates/2014-01/msg00044.html - () http://lists.opensuse.org/opensuse-updates/2014-01/msg00044.html -
References () http://lists.opensuse.org/opensuse-updates/2014-01/msg00047.html - () http://lists.opensuse.org/opensuse-updates/2014-01/msg00047.html -
References () http://lists.opensuse.org/opensuse-updates/2014-01/msg00085.html - () http://lists.opensuse.org/opensuse-updates/2014-01/msg00085.html -
References () http://lists.opensuse.org/opensuse-updates/2014-01/msg00104.html - () http://lists.opensuse.org/opensuse-updates/2014-01/msg00104.html -
References () http://lists.opensuse.org/opensuse-updates/2014-01/msg00106.html - () http://lists.opensuse.org/opensuse-updates/2014-01/msg00106.html -
References () http://lists.qt-project.org/pipermail/announce/2013-December/000036.html - () http://lists.qt-project.org/pipermail/announce/2013-December/000036.html -
References () http://secunia.com/advisories/56008 - Vendor Advisory () http://secunia.com/advisories/56008 - Vendor Advisory
References () http://secunia.com/advisories/56166 - Vendor Advisory () http://secunia.com/advisories/56166 - Vendor Advisory
References () http://www.ubuntu.com/usn/USN-2057-1 - () http://www.ubuntu.com/usn/USN-2057-1 -
References () https://codereview.qt-project.org/#change%2C71010 - () https://codereview.qt-project.org/#change%2C71010 -
References () https://codereview.qt-project.org/#change%2C71368 - () https://codereview.qt-project.org/#change%2C71368 -

Information

Published : 2013-12-23 22:55

Updated : 2024-11-21 01:55


NVD link : CVE-2013-4549

Mitre link : CVE-2013-4549

CVE.ORG link : CVE-2013-4549


JSON object : View

Products Affected

digia

  • qt

qt

  • qt
CWE
CWE-20

Improper Input Validation