CVE-2013-4549
https://notcve.org/view.php?id=CVE-2013-4549
QXmlSimpleReader in Qt before 5.2 allows context-dependent attackers to cause a denial of service (memory consumption) via an XML Entity Expansion (XEE) attack. QXmlSimpleReader en Qt anterior a v5.2 permite a los atacantes dependientes del contexto provocar una denegación de servicio (consumo de memoria) mediante un ataque XML Entity Expansion (XEE). • http://blog.qt.digia.com/blog/2014/04/24/qt-4-8-6-released http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132395.html http://lists.opensuse.org/opensuse-updates/2014-01/msg00044.html http://lists.opensuse.org/opensuse-updates/2014-01/msg00047.html http://lists.opensuse.org/opensuse-updates/2014-01/msg00085.html http://lists.opensuse.org/opensuse-updates/2014-01/msg00104.html http://lists.opensuse.org/opensuse-updates/2014-01/msg00106.html http://lists.qt-proje • CWE-20: Improper Input Validation •
CVE-2012-6093
https://notcve.org/view.php?id=CVE-2012-6093
The QSslSocket::sslErrors function in Qt before 4.6.5, 4.7.x before 4.7.6, 4.8.x before 4.8.5, when using certain versions of openSSL, uses an "incompatible structure layout" that can read memory from the wrong location, which causes Qt to report an incorrect error when certificate validation fails and might cause users to make unsafe security decisions to accept a certificate. La función QSslSocket::sslErrors en Qt anterior a v4.6.5, v4.7.x anterior a v4.7.6, v4.8.x anterior a v4.8.5, cuando se usan ciertas versiones de openSSL, usa un diseño de estructura incompatible que puede leer memoria desde una dirección erronea, lo que produce que Qt reporte un error incorrecto cuando el certificado de validación falle y puede causar a los usuarios que hagan decisiones de seguridad inseguras para aceptar certificados. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=697582 http://lists.opensuse.org/opensuse-updates/2013-01/msg00086.html http://lists.opensuse.org/opensuse-updates/2013-01/msg00089.html http://lists.opensuse.org/opensuse-updates/2013-02/msg00014.html http://lists.qt-project.org/pipermail/announce/2013-January/000020.html http://qt.gitorious.org/qt/qt/commit/3b14dc93cf0ef06f1424d7d6319a1af4505faa53%20%284.7%29 http://qt.gitorious.org/qt/qt/commit/691e78e5061d4cbc0de212d23b06c5dffddf2098%20%284.8%29 http • CWE-310: Cryptographic Issues •
CVE-2012-5624
https://notcve.org/view.php?id=CVE-2012-5624
The XMLHttpRequest object in Qt before 4.8.4 enables http redirection to the file scheme, which allows man-in-the-middle attackers to force the read of arbitrary local files and possibly obtain sensitive information via a file: URL to a QML application. El objeto XMLHttpRequest en Qt anterior a v4.8.4 permite la redirección http al fichero scheme, lo que permite llevar a atacantes de hombre-en-medio (man-in-the-middle) forzar la lectura de ficheros locales arbitrarios y posiblemente obtener información sensible mediante un fichero: URL para una aplicación QML. • http://lists.opensuse.org/opensuse-updates/2013-01/msg00034.html http://lists.opensuse.org/opensuse-updates/2013-01/msg00045.html http://lists.opensuse.org/opensuse-updates/2013-01/msg00048.html http://lists.qt-project.org/pipermail/announce/2012-November/000014.html http://qt.gitorious.org/qt/qt/commit/96311def2466dd44de64d77a1c815b22fbf68f71 http://secunia.com/advisories/52217 http://www.openwall.com/lists/oss-security/2012/12/04/8 http://www.ubuntu.com/usn/USN-1723-1 https://bugz • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2013-0254 – qt: QSharedMemory class created shared memory segments with insecure permissions
https://notcve.org/view.php?id=CVE-2013-0254
The QSharedMemory class in Qt 5.0.0, 4.8.x before 4.8.5, 4.7.x before 4.7.6, and other versions including 4.4.0 uses weak permissions (world-readable and world-writable) for shared memory segments, which allows local users to read sensitive information or modify critical program data, as demonstrated by reading a pixmap being sent to an X server. La clase QSharedMemory en Qt v5.0.0, v4.8.x anterior a v4.8.5, v4.7.x anterior a v4.7.6, y otras versiones incluida la v4.4.0 utiliza permisos débiles (escritura y lectura para todos los usuarios) para segmentos de memoria compartida, lo que permite a usuarios locales leer informacion sensible o modificar datos críticos del programa, como se demostró mediante la lectura de un pixmap enviado al servidor X. • http://lists.opensuse.org/opensuse-updates/2013-03/msg00014.html http://lists.opensuse.org/opensuse-updates/2013-03/msg00015.html http://lists.opensuse.org/opensuse-updates/2013-03/msg00019.html http://lists.qt-project.org/pipermail/announce/2013-February/000023.html http://rhn.redhat.com/errata/RHSA-2013-0669.html https://bugzilla.redhat.com/show_bug.cgi?id=907425 https://access.redhat.com/security/cve/CVE-2013-0254 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2011-3194 – qt buffer overflow in greyscale images
https://notcve.org/view.php?id=CVE-2011-3194
Buffer overflow in the TIFF reader in gui/image/qtiffhandler.cpp in Qt 4.7.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via the TIFFTAG_SAMPLESPERPIXEL tag in a greyscale TIFF image with multiple samples per pixel. Desbordamiento de buffer en el lector de TIFF de gui/image/qtiffhandler.cpp de Qt 4.7.4 permite a atacantes remotos provocar una denegación de servicio (caída) y posiblemente ejecutar código arbitrario a través de la etiqueta TIFFTAG_SAMPLESPERPIXEL de una imagen en escala de grises TIFF con múltiples muestras por pixel. • http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066209.html http://lists.opensuse.org/opensuse-updates/2011-10/msg00007.html http://lists.opensuse.org/opensuse-updates/2011-10/msg00008.html http://rhn.redhat.com/errata/RHSA-2011-1323.html http://rhn.redhat.com/errata/RHSA-2011-1328.html http://secunia.com/advisories/46128 http://secunia.com/advisories/46140 http://secunia.com/advisories/46187 http://secunia.com/advisories/46371 http://secunia.com/advisories • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •