summaryrefslogtreecommitdiff
blob: eac89e7672bd86384b75db57dc95c78a2c65d81c (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="200408-20">
  <title>Qt: Image loader overflows</title>
  <synopsis>
    There are several bugs in Qt's image-handling code which could lead to
    crashes or arbitrary code execution.
  </synopsis>
  <product type="ebuild">Qt</product>
  <announced>2004-08-22</announced>
  <revised count="02">2006-05-22</revised>
  <bug>60855</bug>
  <access>local</access>
  <affected>
    <package name="x11-libs/qt" auto="yes" arch="*">
      <unaffected range="ge">3.3.3</unaffected>
      <vulnerable range="le">3.3.2</vulnerable>
    </package>
  </affected>
  <background>
    <p>
    Qt is a cross-platform GUI toolkit used by KDE.
    </p>
  </background>
  <description>
    <p>
    There are several unspecified bugs in the QImage class which may cause
    crashes or allow execution of arbitrary code as the user running the Qt
    application. These bugs affect the PNG, XPM, BMP, GIF and JPEG image
    types.
    </p>
  </description>
  <impact type="normal">
    <p>
    An attacker may exploit these bugs by causing a user to open a
    carefully-constructed image file in any one of these formats. This may
    be accomplished through e-mail attachments (if the user uses KMail), or
    by simply placing a malformed image on a website and then convicing the
    user to load the site in a Qt-based browser (such as Konqueror).
    </p>
  </impact>
  <workaround>
    <p>
    There is no known workaround at this time. All users are encouraged to
    upgrade to the latest available version of Qt.
    </p>
  </workaround>
  <resolution>
    <p>
    All Qt users should upgrade to the latest version:
    </p>
    <code>
    # emerge sync
    
    # emerge -pv "&gt;=x11-libs/qt-3.3.3"
    # emerge "&gt;=x11-libs/qt-3.3.3"</code>
  </resolution>
  <references>
    <uri link="http://www.mandrakesoft.com/security/advisories?name=MDKSA-2004:085">Mandrake Advisory</uri>
    <uri link="http://www.trolltech.com/developer/changes/changes-3.3.3.html">Qt 3.3.3 ChangeLog</uri>
    <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0691">CVE-2004-0691</uri>
    <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0692">CVE-2004-0692</uri>
    <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0693">CVE-2004-0693</uri>
  </references>
  <metadata tag="requester" timestamp="2004-08-20T22:45:25Z">
    jaervosz
  </metadata>
  <metadata tag="submitter" timestamp="2004-08-21T19:29:43Z">
    condordes
  </metadata>
</glsa>