// For flags

CVE-2007-0242

QT UTF8 improper character expansion

Severity Score

6.1
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The UTF-8 decoder in codecs/qutfcodec.cpp in Qt 3.3.8 and 4.2.3 does not reject long UTF-8 sequences as required by the standard, which allows remote attackers to conduct cross-site scripting (XSS) and directory traversal attacks via long sequences that decode to dangerous metacharacters.

El decodificador de UTF-8 en el codecs/qutfcodec.cpp del Qt 3.3.8 y 4.2.3 no rechaza secuencias largas de UTF-8 como lo solicitado por el estándar, lo que permite a atacantes remotos llevar a cabo ataques de secuencias de comandos en sitios cruzados (XSS) y de escalado de directorios mediante secuencias largas que decodifican metacaracteres peligrosos.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2007-01-16 CVE Reserved
  • 2007-04-03 CVE Published
  • 2024-08-07 CVE Updated
  • 2025-04-28 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
CAPEC
References (38)
URL Tag Source
http://secunia.com/advisories/24699 Third Party Advisory
http://secunia.com/advisories/24705 Third Party Advisory
http://secunia.com/advisories/24726 Third Party Advisory
http://secunia.com/advisories/24727 Third Party Advisory
http://secunia.com/advisories/24759 Third Party Advisory
http://secunia.com/advisories/24797 Third Party Advisory
http://secunia.com/advisories/24847 Third Party Advisory
http://secunia.com/advisories/24889 Third Party Advisory
http://secunia.com/advisories/25263 Third Party Advisory
http://secunia.com/advisories/26804 Third Party Advisory
http://secunia.com/advisories/26857 Third Party Advisory
http://secunia.com/advisories/27108 Third Party Advisory
http://secunia.com/advisories/27275 Third Party Advisory
http://secunia.com/advisories/46117 Third Party Advisory
http://support.avaya.com/elmodocs2/security/ASA-2007-424.htm X_refsource_confirm
http://support.novell.com/techcenter/psdb/39ea4b325a7da742cb8b6995fa585b14.html X_refsource_confirm
http://support.novell.com/techcenter/psdb/fc79b7f48d739f9c803a24ddad933384.html X_refsource_confirm
http://www.nabble.com/Bug-417390:-CVE-2007-0242%2C--Qt-UTF-8-overlong-sequence-decoding-vulnerability-t3506065.html X_refsource_confirm
http://www.securityfocus.com/bid/23269 Vdb Entry
http://www.vupen.com/english/advisories/2007/1212 Vdb Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/33397 Vdb Entry
https://issues.rpath.com/browse/RPL-1202 X_refsource_confirm
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11510 Signature
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Qt
Search vendor "Qt"
Qt
Search vendor "Qt" for product "Qt"
3.3.8
Search vendor "Qt" for product "Qt" and version "3.3.8"
-
Affected
Qt
Search vendor "Qt"
Qt
Search vendor "Qt" for product "Qt"
4.2.3
Search vendor "Qt" for product "Qt" and version "4.2.3"
-
Affected