Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200703-06] AMD64 x86 emulation Qt library: Integer overflow


Vulnerability Assessment Details

[GLSA-200703-06] AMD64 x86 emulation Qt library: Integer overflow

Vulnerability Assessment Summary
AMD64 x86 emulation Qt library: Integer overflow

Detailed Explanation for this Vulnerability Assessment
The remote host is affected by the vulnerability described in GLSA-200703-06
(AMD64 x86 emulation Qt library: Integer overflow)


An integer overflow flaw has been found in the pixmap handling of Qt,
making the AMD64 x86 emulation Qt library vulnerable as well.

Impact

By enticing a user to open a specially crafted pixmap image in an
application using the AMD64 x86 emulation Qt library, a remote attacker
could cause an application crash or the remote execution of arbitrary
code with the rights of the user running the application.

Workaround

There is no known workaround at this time.

References:
http://www.gentoo.org/security/en/glsa/glsa-200611-02.xml
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4811


Solution:
All AMD64 x86 emulation Qt library users should upgrade to the latest
version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=app-emulation/emul-linux-x86-qtlibs-10.0"


Network Security Threat Level: Medium


Networks Security ID:

Vulnerability Assessment Copyright: (C) 2007 Michel Arboi

Cables, Connectors

LENOVO THINKPAD T520 LAPTOP- CORE i5 - 2.50GHz - 4096MB RAM - NO HARD DRIVE
$34.95
LENOVO THINKPAD T520 LAPTOP- CORE i5 - 2.50GHz - 4096MB RAM - NO HARD DRIVE  picture4GB DDR2 Kingston Memory 667 - pc5300 (4X1GB)
$14.99
4GB DDR2 Kingston Memory 667 - pc5300 (4X1GB) pictureKingston HyperX Fury 8GB Kit (2x4GB) 1866MHz DDR3 CL10 DIMM (HX318C10FWK2/8), Wh
$52.49
Kingston HyperX Fury 8GB Kit (2x4GB) 1866MHz DDR3 CL10 DIMM (HX318C10FWK2/8), Wh picture2gb + 1gb DDR3 RAM Samsung
$40.0
2gb + 1gb DDR3 RAM Samsung picture


Discussions

No Discussions have been posted on this vulnerability.