CVE-2015-1859

Multiple buffer overflows in plugins/imageformats/ico/qicohandler.cpp in the QtBase module in Qt before 4.8.7 and 5.x before 5.4.2 allow remote attackers to cause a denial of service (segmentation fault and crash) and possibly execute arbitrary code via a crafted ICO image.
References
Link Resource
http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155424.html Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155927.html Patch Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155962.html Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155976.html Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156727.html Third Party Advisory
http://lists.qt-project.org/pipermail/announce/2015-April/000067.html Patch Vendor Advisory
http://www.securityfocus.com/bid/74307 Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/74310
http://www.ubuntu.com/usn/USN-2626-1
https://security.gentoo.org/glsa/201603-10
http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155424.html Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155927.html Patch Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155962.html Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155976.html Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156727.html Third Party Advisory
http://lists.qt-project.org/pipermail/announce/2015-April/000067.html Patch Vendor Advisory
http://www.securityfocus.com/bid/74307 Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/74310
http://www.ubuntu.com/usn/USN-2626-1
https://security.gentoo.org/glsa/201603-10
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:digia:qt:*:*:*:*:*:*:*:*
cpe:2.3:a:qt:qt:5.0.0:*:*:*:*:*:*:*
cpe:2.3:a:qt:qt:5.0.1:*:*:*:*:*:*:*
cpe:2.3:a:qt:qt:5.0.2:*:*:*:*:*:*:*
cpe:2.3:a:qt:qt:5.1.0:*:*:*:*:*:*:*
cpe:2.3:a:qt:qt:5.2.0:*:*:*:*:*:*:*
cpe:2.3:a:qt:qt:5.2.1:*:*:*:*:*:*:*
cpe:2.3:a:qt:qt:5.3.0:*:*:*:*:*:*:*
cpe:2.3:a:qt:qt:5.4.1:*:*:*:*:*:*:*

History

21 Nov 2024, 02:26

Type Values Removed Values Added
References () http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155424.html - Third Party Advisory () http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155424.html - Third Party Advisory
References () http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155927.html - Patch, Third Party Advisory () http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155927.html - Patch, Third Party Advisory
References () http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155962.html - Third Party Advisory () http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155962.html - Third Party Advisory
References () http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155976.html - Third Party Advisory () http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155976.html - Third Party Advisory
References () http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156727.html - Third Party Advisory () http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156727.html - Third Party Advisory
References () http://lists.qt-project.org/pipermail/announce/2015-April/000067.html - Patch, Vendor Advisory () http://lists.qt-project.org/pipermail/announce/2015-April/000067.html - Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/74307 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/74307 - Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/bid/74310 - () http://www.securityfocus.com/bid/74310 -
References () http://www.ubuntu.com/usn/USN-2626-1 - () http://www.ubuntu.com/usn/USN-2626-1 -
References () https://security.gentoo.org/glsa/201603-10 - () https://security.gentoo.org/glsa/201603-10 -

Information

Published : 2015-05-12 19:59

Updated : 2024-11-21 02:26


NVD link : CVE-2015-1859

Mitre link : CVE-2015-1859

CVE.ORG link : CVE-2015-1859


JSON object : View

Products Affected

digia

  • qt

fedoraproject

  • fedora

qt

  • qt
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer