CVE-2006-4811
⚪ Do wiadomości
Przepełnienie całkowitej liczby w Qt umożliwia zdalne wywołanie awarii i potencjalne wykonanie kodu.
CVSS
6.8
EPSS
17.4%
Exploit
none
Vendor
qt
Opis źródłowy (NVD)
Integer overflow in Qt 3.3 before 3.3.7, 4.1 before 4.1.5, and 4.2 before 4.2.1, as used in the KDE khtml library, kdelibs 3.1.3, and possibly other packages, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted pixmap image.
dos
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 6.8 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 17.4% |
| Opublikowano (NVD) | 2006-10-18 17:07:00 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-23 00:35:47 UTC |
Referencje
- ftp://patches.sgi.com/support/free/security/advisories/20061002-01-P (secalert@redhat.com)
- ftp://patches.sgi.com/support/free/security/advisories/20061101-01-P (secalert@redhat.com)
- http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=210742 (secalert@redhat.com)
- http://lists.suse.com/archive/suse-security-announce/2006-Oct/0006.html (secalert@redhat.com)
- http://secunia.com/advisories/22380 (secalert@redhat.com) [Patch, Vendor Advisory]
- http://secunia.com/advisories/22397 (secalert@redhat.com) [Vendor Advisory]
- http://secunia.com/advisories/22479 (secalert@redhat.com) [Patch, Vendor Advisory]
- http://secunia.com/advisories/22485 (secalert@redhat.com) [Patch, Vendor Advisory]
- http://secunia.com/advisories/22492 (secalert@redhat.com) [Patch, Vendor Advisory]
- http://secunia.com/advisories/22520 (secalert@redhat.com) [Patch, Vendor Advisory]
- http://secunia.com/advisories/22579 (secalert@redhat.com) [Vendor Advisory]
- http://secunia.com/advisories/22586 (secalert@redhat.com) [Vendor Advisory]
- http://secunia.com/advisories/22589 (secalert@redhat.com) [Vendor Advisory]
- http://secunia.com/advisories/22645 (secalert@redhat.com) [Vendor Advisory]
- http://secunia.com/advisories/22738 (secalert@redhat.com) [Vendor Advisory]
- http://secunia.com/advisories/22890 (secalert@redhat.com) [Vendor Advisory]
- http://secunia.com/advisories/22929 (secalert@redhat.com) [Vendor Advisory]
- http://secunia.com/advisories/24347 (secalert@redhat.com) [Vendor Advisory]
- http://security.gentoo.org/glsa/glsa-200611-02.xml (secalert@redhat.com)
- http://security.gentoo.org/glsa/glsa-200703-06.xml (secalert@redhat.com)
- http://securitytracker.com/id?1017084 (secalert@redhat.com)
- http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.483634 (secalert@redhat.com)
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:186 (secalert@redhat.com)
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:187 (secalert@redhat.com)
- http://www.redhat.com/support/errata/RHSA-2006-0720.html (secalert@redhat.com) [Patch, Vendor Advisory]
- http://www.redhat.com/support/errata/RHSA-2006-0725.html (secalert@redhat.com) [Vendor Advisory]
- http://www.securityfocus.com/archive/1/449173/100/0/threaded (secalert@redhat.com)
- http://www.securityfocus.com/bid/20599 (secalert@redhat.com)
- http://www.trolltech.com/company/newsroom/announcements/press.2006-10-19.5434451733 (secalert@redhat.com)
- http://www.ubuntu.com/usn/usn-368-1 (secalert@redhat.com) [Patch]
- http://www.us.debian.org/security/2006/dsa-1200 (secalert@redhat.com)
- http://www.vupen.com/english/advisories/2006/4099 (secalert@redhat.com) [Vendor Advisory]
- https://issues.rpath.com/browse/RPL-723 (secalert@redhat.com)
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10218 (secalert@redhat.com)