7.5
CVSSv2

CVE-2007-4137

Published: 18/09/2007 Updated: 07/11/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Off-by-one error in the QUtf8Decoder::toUnicode function in Trolltech Qt 3 allows context-dependent malicious users to cause a denial of service (crash) via a crafted Unicode string that triggers a heap-based buffer overflow. NOTE: Qt 4 has the same error in the QUtf8Codec::convertToUnicode function, but it is not exploitable.

Vulnerable Product Search on Vulmon Subscribe to Product

trolltech qt 3.0

trolltech qt 3.0.3

trolltech qt 3.0.5

trolltech qt 3.1

trolltech qt 3.1.1

trolltech qt 3.1.2

trolltech qt 3.2.1

trolltech qt 3.2.3

trolltech qt 3.3.0

trolltech qt 3.3.1

trolltech qt 3.3.2

trolltech qt 3.3.3

trolltech qt 3.3.4

trolltech qt 3.3.5

trolltech qt 3.3.6

trolltech qt 3.3.7

trolltech qt 3.3.8

trolltech qt 4.1

trolltech qt 4.1.4

trolltech qt 4.1.5

trolltech qt 4.2

trolltech qt 4.2.1

trolltech qt 4.2.3

Vendor Advisories

Debian Bug report logs - #442780 CVE-2007-4137: buffer overflow in QUtf8Decoder Package: libqt3-mt; Maintainer for libqt3-mt is (unknown); Reported by: Stefan Fritsch <sf@sfritschde> Date: Sun, 16 Sep 2007 19:09:01 UTC Severity: grave Tags: patch, security Found in version qt-x11-free/3:337-7 Fixed in version qt-x11-fr ...
Dirk Mueller discovered that UTF8 strings could be made to cause a small buffer overflow A remote attacker could exploit this by sending specially crafted strings to applications that use the Qt3 library for UTF8 processing, potentially leading to arbitrary code execution with user privileges, or a denial of service ...
Several local/remote vulnerabilities have been discovered in the Qt GUI library The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2007-3388 Tim Brown and Dirk Müller discovered several format string vulnerabilities in the handling of error messages, which might lead to the execution of arbitrary ...

References

CWE-119http://dist.trolltech.com/developer/download/175791_3.diffhttp://dist.trolltech.com/developer/download/175791_4.diffhttps://bugzilla.redhat.com/show_bug.cgi?id=269001http://trolltech.com/company/newsroom/announcements/press.2007-09-03.7564032119http://www.redhat.com/support/errata/RHSA-2007-0883.htmlhttp://www.securityfocus.com/bid/25657http://secunia.com/advisories/26778http://secunia.com/advisories/26782http://secunia.com/advisories/26811https://issues.rpath.com/browse/RPL-1751http://support.avaya.com/elmodocs2/security/ASA-2007-424.htmhttp://bugs.gentoo.org/show_bug.cgi?id=192472http://www.debian.org/security/2007/dsa-1426http://fedoranews.org/updates/FEDORA-2007-221.shtmlhttp://fedoranews.org/updates/FEDORA-2007-703.shtmlhttp://security.gentoo.org/glsa/glsa-200710-28.xmlhttp://security.gentoo.org/glsa/glsa-200712-08.xmlhttp://www.mandriva.com/security/advisories?name=MDKSA-2007:183ftp://patches.sgi.com/support/free/security/advisories/20070901-01-P.aschttp://www.novell.com/linux/security/advisories/2007_19_sr.htmlhttp://www.ubuntu.com/usn/usn-513-1http://securitytracker.com/id?1018688http://secunia.com/advisories/26857http://secunia.com/advisories/26804http://secunia.com/advisories/26868http://secunia.com/advisories/26882http://secunia.com/advisories/27053http://secunia.com/advisories/26987http://secunia.com/advisories/27275http://secunia.com/advisories/27382http://secunia.com/advisories/27996http://secunia.com/advisories/28021http://osvdb.org/39384http://www.vupen.com/english/advisories/2007/3144https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11159http://www.securityfocus.com/archive/1/481498/100/0/threadedhttps://bugs.debian.org/cgi-bin/bugreport.cgi?bug=442780https://usn.ubuntu.com/513-1/https://nvd.nist.gov