4.3
CVSSv2

CVE-2007-0242

Published: 03/04/2007 Updated: 07/11/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

The UTF-8 decoder in codecs/qutfcodec.cpp in Qt 3.3.8 and 4.2.3 does not reject long UTF-8 sequences as required by the standard, which allows remote malicious users to conduct cross-site scripting (XSS) and directory traversal attacks via long sequences that decode to dangerous metacharacters.

Vulnerable Product Search on Vulmon Subscribe to Product

qt qt 3.3.8

qt qt 4.2.3

Vendor Advisories

The Qt library did not correctly handle truncated UTF8 strings, which could cause some applications to incorrectly filter malicious strings If a Konqueror user were tricked into visiting a web site containing specially crafted strings, normal XSS prevention could be bypassed allowing a remote attacker to steal confidential data ...
Andreas Nolden discovered a bug in the UTF8 decoding routines in qt4-x11, a C++ GUI library framework, that could allow remote attackers to conduct cross-site scripting (XSS) and directory traversal attacks via long sequences that decode to dangerous metacharacters For the stable distribution (etch), this problem has been fixed in version 421-2e ...

References

NVD-CWE-Otherhttp://www.trolltech.com/company/newsroom/announcements/press.2007-03-30.9172215350http://www.securityfocus.com/bid/23269http://secunia.com/advisories/24727http://secunia.com/advisories/24699http://secunia.com/advisories/24705http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.348591http://www.ubuntu.com/usn/usn-452-1http://secunia.com/advisories/24726http://secunia.com/advisories/24847http://support.novell.com/techcenter/psdb/39ea4b325a7da742cb8b6995fa585b14.htmlhttp://support.novell.com/techcenter/psdb/fc79b7f48d739f9c803a24ddad933384.htmlhttp://www.novell.com/linux/security/advisories/2007_6_sr.htmlhttp://secunia.com/advisories/24797http://secunia.com/advisories/24889https://issues.rpath.com/browse/RPL-1202http://secunia.com/advisories/24759http://www.debian.org/security/2007/dsa-1292http://secunia.com/advisories/25263http://support.avaya.com/elmodocs2/security/ASA-2007-424.htmhttp://fedoranews.org/updates/FEDORA-2007-703.shtmlhttp://www.mandriva.com/security/advisories?name=MDKSA-2007:074http://www.mandriva.com/security/advisories?name=MDKSA-2007:075http://www.mandriva.com/security/advisories?name=MDKSA-2007:076http://www.redhat.com/support/errata/RHSA-2007-0909.htmlhttp://www.redhat.com/support/errata/RHSA-2007-0883.htmlftp://patches.sgi.com/support/free/security/advisories/20070901-01-P.aschttp://secunia.com/advisories/26857http://secunia.com/advisories/26804http://secunia.com/advisories/27108http://secunia.com/advisories/27275http://www.vupen.com/english/advisories/2007/1212http://secunia.com/advisories/46117http://rhn.redhat.com/errata/RHSA-2011-1324.htmlhttps://exchange.xforce.ibmcloud.com/vulnerabilities/33397https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11510http://www.nabble.com/Bug-417390:-CVE-2007-0242%2C--Qt-UTF-8-overlong-sequence-decoding-vulnerability-t3506065.htmlhttps://usn.ubuntu.com/452-1/https://nvd.nist.gov