CVE-2011-3193
qt/harfbuzz buffer overflow
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
Desbordamiento de buffer de memoria dinámica en la función Lookup_MarkMarkPos del módulo HarfBuzz (harfbuzz-gpos.c), tal como se usa en Qt anteriores a 4.7.4 y Pango. Permite a atacantes remotos provocar una denegación de servicio (caída) y posiblemente ejecutar código arbitrario a través de un archivo de fuentes modificado.
Qt is a software toolkit that simplifies the task of writing and maintaining GUI applications for the X Window System. HarfBuzz is an OpenType text shaping engine. A buffer overflow flaw was found in the harfbuzz module in Qt. If a user loaded a specially-crafted font file with an application linked against Qt, it could cause the application to crash or, possibly, execute arbitrary code with the privileges of the user running the application. A buffer overflow flaw was found in the way Qt handled certain gray-scale image files. If a user loaded a specially-crafted gray-scale image file with an application linked against Qt, it could cause the application to crash or, possibly, execute arbitrary code with the privileges of the user running the application.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2011-08-19 CVE Reserved
- 2011-09-22 CVE Published
- 2024-08-06 CVE Updated
- 2025-04-03 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-787: Out-of-bounds Write
CAPEC
References (30)
URL | Tag | Source |
---|---|---|
http://secunia.com/advisories/41537 | Third Party Advisory | |
http://secunia.com/advisories/46117 | Third Party Advisory | |
http://secunia.com/advisories/46118 | Third Party Advisory | |
http://secunia.com/advisories/46119 | Third Party Advisory | |
http://secunia.com/advisories/46128 | Third Party Advisory | |
http://secunia.com/advisories/46371 | Third Party Advisory | |
http://secunia.com/advisories/46410 | Third Party Advisory | |
http://secunia.com/advisories/49895 | Third Party Advisory | |
http://www.openwall.com/lists/oss-security/2011/08/22/6 | Mailing List |
|
http://www.openwall.com/lists/oss-security/2011/08/24/8 | Mailing List |
|
http://www.openwall.com/lists/oss-security/2011/08/25/1 | Mailing List |
|
http://www.osvdb.org/75652 | Broken Link | |
http://www.securityfocus.com/bid/49723 | Third Party Advisory | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/69991 | Third Party Advisory | |
https://qt.gitorious.org/qt/qt/commit/9ae6f2f9a57f0c3096d5785913e437953fa6775c | Broken Link |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.opensuse.org/opensuse-updates/2011-10/msg00007.html | 2021-07-14 | |
http://lists.opensuse.org/opensuse-updates/2011-10/msg00008.html | 2021-07-14 | |
http://rhn.redhat.com/errata/RHSA-2011-1323.html | 2021-07-14 | |
http://rhn.redhat.com/errata/RHSA-2011-1324.html | 2021-07-14 | |
http://rhn.redhat.com/errata/RHSA-2011-1325.html | 2021-07-14 | |
http://rhn.redhat.com/errata/RHSA-2011-1326.html | 2021-07-14 | |
http://rhn.redhat.com/errata/RHSA-2011-1327.html | 2021-07-14 | |
http://rhn.redhat.com/errata/RHSA-2011-1328.html | 2021-07-14 | |
http://www.ubuntu.com/usn/USN-1504-1 | 2021-07-14 | |
https://hermes.opensuse.org/messages/12056605 | 2021-07-14 | |
https://access.redhat.com/security/cve/CVE-2011-3193 | 2011-09-21 | |
https://bugzilla.redhat.com/show_bug.cgi?id=733118 | 2011-09-21 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Gnome Search vendor "Gnome" | Pango Search vendor "Gnome" for product "Pango" | < 1.25.1 Search vendor "Gnome" for product "Pango" and version " < 1.25.1" | - |
Affected
| ||||||
Qt Search vendor "Qt" | Qt Search vendor "Qt" for product "Qt" | < 4.7.4 Search vendor "Qt" for product "Qt" and version " < 4.7.4" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 10.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "10.04" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 11.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "11.04" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Desktop Search vendor "Redhat" for product "Enterprise Linux Desktop" | 4.0 Search vendor "Redhat" for product "Enterprise Linux Desktop" and version "4.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Desktop Search vendor "Redhat" for product "Enterprise Linux Desktop" | 5.0 Search vendor "Redhat" for product "Enterprise Linux Desktop" and version "5.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Desktop Search vendor "Redhat" for product "Enterprise Linux Desktop" | 6.0 Search vendor "Redhat" for product "Enterprise Linux Desktop" and version "6.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Eus Search vendor "Redhat" for product "Enterprise Linux Eus" | 6.1 Search vendor "Redhat" for product "Enterprise Linux Eus" and version "6.1" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Server Search vendor "Redhat" for product "Enterprise Linux Server" | 4.0 Search vendor "Redhat" for product "Enterprise Linux Server" and version "4.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Server Search vendor "Redhat" for product "Enterprise Linux Server" | 5.0 Search vendor "Redhat" for product "Enterprise Linux Server" and version "5.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Server Search vendor "Redhat" for product "Enterprise Linux Server" | 6.0 Search vendor "Redhat" for product "Enterprise Linux Server" and version "6.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Workstation Search vendor "Redhat" for product "Enterprise Linux Workstation" | 4.0 Search vendor "Redhat" for product "Enterprise Linux Workstation" and version "4.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Workstation Search vendor "Redhat" for product "Enterprise Linux Workstation" | 5.0 Search vendor "Redhat" for product "Enterprise Linux Workstation" and version "5.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Workstation Search vendor "Redhat" for product "Enterprise Linux Workstation" | 6.0 Search vendor "Redhat" for product "Enterprise Linux Workstation" and version "6.0" | - |
Affected
| ||||||
Opensuse Search vendor "Opensuse" | Opensuse Search vendor "Opensuse" for product "Opensuse" | 11.3 Search vendor "Opensuse" for product "Opensuse" and version "11.3" | - |
Affected
| ||||||
Opensuse Search vendor "Opensuse" | Opensuse Search vendor "Opensuse" for product "Opensuse" | 11.4 Search vendor "Opensuse" for product "Opensuse" and version "11.4" | - |
Affected
|