Lucene search

K
gentooGentoo FoundationGLSA-200509-18
HistorySep 26, 2005 - 12:00 a.m.

Qt: Buffer overflow in the included zlib library

2005-09-2600:00:00
Gentoo Foundation
security.gentoo.org
18

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.114 Low

EPSS

Percentile

95.2%

Background

Qt is a cross-platform GUI toolkit used by KDE.

Description

Qt links to a bundled vulnerable version of zlib when emerged with the zlib USE-flag disabled. This may lead to a buffer overflow.

Impact

By creating a specially crafted compressed data stream, attackers can overwrite data structures for applications that use Qt, resulting in a Denial of Service or potentially arbitrary code execution.

Workaround

Emerge Qt with the zlib USE-flag enabled.

Resolution

All Qt users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=x11-libs/qt-3.3.4-r8"
OSVersionArchitecturePackageVersionFilename
Gentooanyallx11-libs/qt< 3.3.4-r8UNKNOWN

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.114 Low

EPSS

Percentile

95.2%