ID SUSE_QT3-4420.NASL
Type nessus
Reporter This script is Copyright (C) 2007-2021 Tenable Network Security, Inc.
Modified 2021-01-14T00:00:00
Description
This update fixes a buffer overflow in qt3 while handling UTF8 characters. (CVE-2007-4137)
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The text description of this plugin is (C) Novell, Inc.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(29566);
script_version("1.17");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/14");
script_cve_id("CVE-2007-4137");
script_name(english:"SuSE 10 Security Update : qt3 (ZYPP Patch Number 4420)");
script_summary(english:"Checks rpm output for the updated packages");
script_set_attribute(
attribute:"synopsis",
value:"The remote SuSE 10 host is missing a security-related patch."
);
script_set_attribute(
attribute:"description",
value:
"This update fixes a buffer overflow in qt3 while handling UTF8
characters. (CVE-2007-4137)"
);
script_set_attribute(
attribute:"see_also",
value:"http://support.novell.com/security/cve/CVE-2007-4137.html"
);
script_set_attribute(attribute:"solution", value:"Apply ZYPP patch number 4420.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_cwe_id(119);
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/o:suse:suse_linux");
script_set_attribute(attribute:"patch_publication_date", value:"2007/09/21");
script_set_attribute(attribute:"plugin_publication_date", value:"2007/12/13");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2007-2021 Tenable Network Security, Inc.");
script_family(english:"SuSE Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list");
exit(0);
}
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) exit(0, "Local checks are not enabled.");
if (!get_kb_item("Host/SuSE/release")) exit(0, "The host is not running SuSE.");
if (!get_kb_item("Host/SuSE/rpm-list")) exit(1, "Could not obtain the list of installed packages.");
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) exit(1, "Failed to determine the architecture type.");
if (cpu >!< "x86_64" && cpu !~ "^i[3-6]86$") exit(1, "Local checks for SuSE 10 on the '"+cpu+"' architecture have not been implemented.");
flag = 0;
if (rpm_check(release:"SLED10", sp:1, reference:"qt3-3.3.5-58.32")) flag++;
if (rpm_check(release:"SLED10", sp:1, reference:"qt3-devel-3.3.5-58.32")) flag++;
if (rpm_check(release:"SLED10", sp:1, reference:"qt3-devel-doc-3.3.5-58.29")) flag++;
if (rpm_check(release:"SLED10", sp:1, reference:"qt3-devel-tools-3.3.5-58.29")) flag++;
if (rpm_check(release:"SLED10", sp:1, cpu:"x86_64", reference:"qt3-32bit-3.3.5-58.32")) flag++;
if (rpm_check(release:"SLED10", sp:1, cpu:"x86_64", reference:"qt3-devel-32bit-3.3.5-58.32")) flag++;
if (rpm_check(release:"SLES10", sp:1, reference:"qt3-3.3.5-58.32")) flag++;
if (rpm_check(release:"SLES10", sp:1, reference:"qt3-devel-3.3.5-58.32")) flag++;
if (rpm_check(release:"SLES10", sp:1, reference:"qt3-devel-doc-3.3.5-58.29")) flag++;
if (rpm_check(release:"SLES10", sp:1, reference:"qt3-devel-tools-3.3.5-58.29")) flag++;
if (rpm_check(release:"SLES10", sp:1, cpu:"x86_64", reference:"qt3-32bit-3.3.5-58.32")) flag++;
if (rpm_check(release:"SLES10", sp:1, cpu:"x86_64", reference:"qt3-devel-32bit-3.3.5-58.32")) flag++;
if (flag)
{
if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
else security_hole(0);
exit(0);
}
else exit(0, "The host is not affected.");
{"id": "SUSE_QT3-4420.NASL", "type": "nessus", "bulletinFamily": "scanner", "title": "SuSE 10 Security Update : qt3 (ZYPP Patch Number 4420)", "description": "This update fixes a buffer overflow in qt3 while handling UTF8 characters. (CVE-2007-4137)", "published": "2007-12-13T00:00:00", "modified": "2021-01-14T00:00:00", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cvss2": {}, "cvss3": {"score": null, "vector": null}, "href": "https://www.tenable.com/plugins/nessus/29566", "reporter": "This script is Copyright (C) 2007-2021 Tenable Network Security, Inc.", "references": ["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4137", "http://support.novell.com/security/cve/CVE-2007-4137.html"], "cvelist": ["CVE-2007-4137"], "immutableFields": [], "lastseen": "2021-08-19T13:12:11", "viewCount": 1, "enchantments": {"dependencies": {"references": [{"type": "centos", "idList": ["CESA-2007:0883", "CESA-2007:0883-01"]}, {"type": "cve", "idList": ["CVE-2007-4137"]}, {"type": "debian", "idList": ["DEBIAN:DSA-1426-1:21F58"]}, {"type": "debiancve", "idList": ["DEBIANCVE:CVE-2007-4137"]}, {"type": "fedora", "idList": ["FEDORA:L8IMCBQQ018336", "FEDORA:L8J2RWZB020564"]}, {"type": "gentoo", "idList": ["GLSA-200710-28"]}, {"type": "nessus", "idList": ["CENTOS_RHSA-2007-0883.NASL", "DEBIAN_DSA-1426.NASL", "FEDORA_2007-2216.NASL", "FEDORA_2007-703.NASL", "GENTOO_GLSA-200710-28.NASL", "MANDRAKE_MDKSA-2007-183.NASL", "ORACLELINUX_ELSA-2007-0883.NASL", "REDHAT-RHSA-2007-0883.NASL", "SL_20070913_QT_ON_SL5_X.NASL", "SUSE9_11795.NASL", "SUSE_QT3-4421.NASL", "UBUNTU_USN-513-1.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310122664", "OPENVAS:1361412562310830124", "OPENVAS:58707", "OPENVAS:59960", "OPENVAS:59970", "OPENVAS:830124", "OPENVAS:840145", "OPENVAS:861158", "OPENVAS:861453"]}, {"type": "oraclelinux", "idList": ["ELSA-2007-0883"]}, {"type": "redhat", "idList": ["RHSA-2007:0883"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:DOC:18000", "SECURITYVULNS:VULN:8153"]}, {"type": "ubuntu", "idList": ["USN-513-1"]}, {"type": "ubuntucve", "idList": ["UB:CVE-2007-4137"]}]}, "score": {"value": 6.6, "vector": "NONE"}, "backreferences": {"references": [{"type": "centos", "idList": ["CESA-2007:0883", "CESA-2007:0883-01"]}, {"type": "cve", "idList": ["CVE-2007-4137"]}, {"type": "fedora", "idList": ["FEDORA:L8IMCBQQ018336"]}, {"type": "nessus", "idList": ["CENTOS_RHSA-2007-0883.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:861158"]}, {"type": "oraclelinux", "idList": ["ELSA-2007-0883"]}, {"type": "redhat", "idList": ["RHSA-2007:0883"]}, {"type": "ubuntu", "idList": ["USN-513-1"]}, {"type": "ubuntucve", "idList": ["UB:CVE-2007-4137"]}]}, "exploitation": null, "vulnersScore": 6.6}, "pluginID": "29566", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The text description of this plugin is (C) Novell, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(29566);\n script_version(\"1.17\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2007-4137\");\n\n script_name(english:\"SuSE 10 Security Update : qt3 (ZYPP Patch Number 4420)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SuSE 10 host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update fixes a buffer overflow in qt3 while handling UTF8\ncharacters. (CVE-2007-4137)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2007-4137.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Apply ZYPP patch number 4420.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_cwe_id(119);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:suse:suse_linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2007/09/21\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2007/12/13\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2007-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) exit(0, \"Local checks are not enabled.\");\nif (!get_kb_item(\"Host/SuSE/release\")) exit(0, \"The host is not running SuSE.\");\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) exit(1, \"Could not obtain the list of installed packages.\");\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) exit(1, \"Failed to determine the architecture type.\");\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") exit(1, \"Local checks for SuSE 10 on the '\"+cpu+\"' architecture have not been implemented.\");\n\n\nflag = 0;\nif (rpm_check(release:\"SLED10\", sp:1, reference:\"qt3-3.3.5-58.32\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:1, reference:\"qt3-devel-3.3.5-58.32\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:1, reference:\"qt3-devel-doc-3.3.5-58.29\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:1, reference:\"qt3-devel-tools-3.3.5-58.29\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:1, cpu:\"x86_64\", reference:\"qt3-32bit-3.3.5-58.32\")) flag++;\nif (rpm_check(release:\"SLED10\", sp:1, cpu:\"x86_64\", reference:\"qt3-devel-32bit-3.3.5-58.32\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:1, reference:\"qt3-3.3.5-58.32\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:1, reference:\"qt3-devel-3.3.5-58.32\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:1, reference:\"qt3-devel-doc-3.3.5-58.29\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:1, reference:\"qt3-devel-tools-3.3.5-58.29\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:1, cpu:\"x86_64\", reference:\"qt3-32bit-3.3.5-58.32\")) flag++;\nif (rpm_check(release:\"SLES10\", sp:1, cpu:\"x86_64\", reference:\"qt3-devel-32bit-3.3.5-58.32\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse exit(0, \"The host is not affected.\");\n", "naslFamily": "SuSE Local Security Checks", "cpe": ["cpe:/o:suse:suse_linux"], "solution": "Apply ZYPP patch number 4420.", "nessusSeverity": "High", "cvssScoreSource": "", "vpr": {"risk factor": "Medium", "score": "4.7"}, "exploitAvailable": false, "exploitEase": "", "patchPublicationDate": "2007-09-21T00:00:00", "vulnerabilityPublicationDate": null, "exploitableWith": [], "_state": {"dependencies": 1647589307, "score": 0}}
{"ubuntucve": [{"lastseen": "2021-11-22T22:01:59", "description": "Off-by-one error in the QUtf8Decoder::toUnicode function in Trolltech Qt 3\nallows context-dependent attackers to cause a denial of service (crash) via\na crafted Unicode string that triggers a heap-based buffer overflow. NOTE:\nQt 4 has the same error in the QUtf8Codec::convertToUnicode function, but\nit is not exploitable.", "cvss3": {}, "published": "2007-09-18T00:00:00", "type": "ubuntucve", "title": "CVE-2007-4137", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": true, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2007-4137"], "modified": "2007-09-18T00:00:00", "id": "UB:CVE-2007-4137", "href": "https://ubuntu.com/security/CVE-2007-4137", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "nessus": [{"lastseen": "2021-08-19T13:06:45", "description": "An off-by-one error in the QUtf8Decoder::toUnicode() method has been found which may allow a denial of service attack with specially crafted UTF-8 character sequences that trigger a buffer overflow.\n(CVE-2007-4137)", "cvss3": {"score": null, "vector": null}, "published": "2009-09-24T00:00:00", "type": "nessus", "title": "SuSE9 Security Update : qt3 (YOU Patch Number 11795)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2007-4137"], "modified": "2021-01-14T00:00:00", "cpe": ["cpe:/o:suse:suse_linux"], "id": "SUSE9_11795.NASL", "href": "https://www.tenable.com/plugins/nessus/41152", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The text description of this plugin is (C) Novell, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(41152);\n script_version(\"1.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2007-4137\");\n\n script_name(english:\"SuSE9 Security Update : qt3 (YOU Patch Number 11795)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SuSE 9 host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"An off-by-one error in the QUtf8Decoder::toUnicode() method has been\nfound which may allow a denial of service attack with specially\ncrafted UTF-8 character sequences that trigger a buffer overflow.\n(CVE-2007-4137)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2007-4137.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Apply YOU patch number 11795.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_cwe_id(119);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:suse:suse_linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2007/09/25\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/09/24\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) exit(0, \"Local checks are not enabled.\");\nif (!get_kb_item(\"Host/SuSE/release\")) exit(0, \"The host is not running SuSE.\");\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) exit(1, \"Could not obtain the list of installed packages.\");\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) exit(1, \"Failed to determine the architecture type.\");\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") exit(1, \"Local checks for SuSE 9 on the '\"+cpu+\"' architecture have not been implemented.\");\n\n\nflag = 0;\nif (rpm_check(release:\"SUSE9\", reference:\"qt3-3.3.1-36.31\")) flag++;\nif (rpm_check(release:\"SUSE9\", reference:\"qt3-devel-3.3.1-36.31\")) flag++;\nif (rpm_check(release:\"SUSE9\", reference:\"qt3-devel-doc-3.3.1-36.31\")) flag++;\nif (rpm_check(release:\"SUSE9\", reference:\"qt3-devel-tools-3.3.1-35.24\")) flag++;\nif (rpm_check(release:\"SUSE9\", reference:\"qt3-non-mt-3.3.1-41.29\")) flag++;\nif (rpm_check(release:\"SUSE9\", cpu:\"x86_64\", reference:\"qt3-32bit-9-200709191359\")) flag++;\nif (rpm_check(release:\"SUSE9\", cpu:\"x86_64\", reference:\"qt3-devel-32bit-9-200709191359\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse exit(0, \"The host is not affected.\");\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T13:12:56", "description": "Dirk Mueller discovered that UTF8 strings could be made to cause a small buffer overflow. A remote attacker could exploit this by sending specially crafted strings to applications that use the Qt3 library for UTF8 processing, potentially leading to arbitrary code execution with user privileges, or a denial of service.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": null, "vector": null}, "published": "2007-11-10T00:00:00", "type": "nessus", "title": "Ubuntu 6.06 LTS / 6.10 / 7.04 : qt-x11-free vulnerability (USN-513-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2007-4137"], "modified": "2021-01-19T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:libqt3-compat-headers", "p-cpe:/a:canonical:ubuntu_linux:libqt3-headers", "p-cpe:/a:canonical:ubuntu_linux:libqt3-i18n", "p-cpe:/a:canonical:ubuntu_linux:libqt3-mt", "p-cpe:/a:canonical:ubuntu_linux:libqt3-mt-dev", "p-cpe:/a:canonical:ubuntu_linux:libqt3-mt-mysql", "p-cpe:/a:canonical:ubuntu_linux:libqt3-mt-odbc", "p-cpe:/a:canonical:ubuntu_linux:libqt3-mt-psql", "p-cpe:/a:canonical:ubuntu_linux:libqt3-mt-sqlite", "p-cpe:/a:canonical:ubuntu_linux:qt-x11-free-dbg", "p-cpe:/a:canonical:ubuntu_linux:qt3-apps-dev", "p-cpe:/a:canonical:ubuntu_linux:qt3-assistant", "p-cpe:/a:canonical:ubuntu_linux:qt3-designer", "p-cpe:/a:canonical:ubuntu_linux:qt3-dev-tools", "p-cpe:/a:canonical:ubuntu_linux:qt3-dev-tools-compat", "p-cpe:/a:canonical:ubuntu_linux:qt3-dev-tools-embedded", "p-cpe:/a:canonical:ubuntu_linux:qt3-doc", "p-cpe:/a:canonical:ubuntu_linux:qt3-examples", "p-cpe:/a:canonical:ubuntu_linux:qt3-linguist", "p-cpe:/a:canonical:ubuntu_linux:qt3-qtconfig", "cpe:/o:canonical:ubuntu_linux:6.06:-:lts", "cpe:/o:canonical:ubuntu_linux:6.10", "cpe:/o:canonical:ubuntu_linux:7.04"], "id": "UBUNTU_USN-513-1.NASL", "href": "https://www.tenable.com/plugins/nessus/28118", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-513-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(28118);\n script_version(\"1.15\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2007-4137\");\n script_xref(name:\"USN\", value:\"513-1\");\n\n script_name(english:\"Ubuntu 6.06 LTS / 6.10 / 7.04 : qt-x11-free vulnerability (USN-513-1)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Dirk Mueller discovered that UTF8 strings could be made to cause a\nsmall buffer overflow. A remote attacker could exploit this by sending\nspecially crafted strings to applications that use the Qt3 library for\nUTF8 processing, potentially leading to arbitrary code execution with\nuser privileges, or a denial of service.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/513-1/\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_cwe_id(119);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libqt3-compat-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libqt3-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libqt3-i18n\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libqt3-mt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libqt3-mt-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libqt3-mt-mysql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libqt3-mt-odbc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libqt3-mt-psql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:libqt3-mt-sqlite\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:qt-x11-free-dbg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:qt3-apps-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:qt3-assistant\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:qt3-designer\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:qt3-dev-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:qt3-dev-tools-compat\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:qt3-dev-tools-embedded\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:qt3-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:qt3-examples\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:qt3-linguist\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:qt3-qtconfig\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:6.06:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:6.10\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:7.04\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2007/09/18\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2007/11/10\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2007-2019 Canonical, Inc. / NASL script (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! ereg(pattern:\"^(6\\.06|6\\.10|7\\.04)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 6.06 / 6.10 / 7.04\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"6.06\", pkgname:\"libqt3-compat-headers\", pkgver:\"3.3.6-1ubuntu6.4\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"libqt3-headers\", pkgver:\"3.3.6-1ubuntu6.4\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"libqt3-i18n\", pkgver:\"3.3.6-1ubuntu6.4\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"libqt3-mt\", pkgver:\"3:3.3.6-1ubuntu6.4\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"libqt3-mt-dev\", pkgver:\"3.3.6-1ubuntu6.4\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"libqt3-mt-mysql\", pkgver:\"3.3.6-1ubuntu6.4\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"libqt3-mt-odbc\", pkgver:\"3.3.6-1ubuntu6.4\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"libqt3-mt-psql\", pkgver:\"3.3.6-1ubuntu6.4\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"libqt3-mt-sqlite\", pkgver:\"3.3.6-1ubuntu6.4\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"qt-x11-free-dbg\", pkgver:\"3.3.6-1ubuntu6.4\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"qt3-apps-dev\", pkgver:\"3.3.6-1ubuntu6.4\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"qt3-assistant\", pkgver:\"3.3.6-1ubuntu6.4\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"qt3-designer\", pkgver:\"3.3.6-1ubuntu6.4\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"qt3-dev-tools\", pkgver:\"3.3.6-1ubuntu6.4\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"qt3-dev-tools-compat\", pkgver:\"3.3.6-1ubuntu6.4\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"qt3-dev-tools-embedded\", pkgver:\"3.3.6-1ubuntu6.4\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"qt3-doc\", pkgver:\"3.3.6-1ubuntu6.4\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"qt3-examples\", pkgver:\"3.3.6-1ubuntu6.4\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"qt3-linguist\", pkgver:\"3.3.6-1ubuntu6.4\")) flag++;\nif (ubuntu_check(osver:\"6.06\", pkgname:\"qt3-qtconfig\", pkgver:\"3.3.6-1ubuntu6.4\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"libqt3-compat-headers\", pkgver:\"3.3.6-3ubuntu3.3\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"libqt3-headers\", pkgver:\"3.3.6-3ubuntu3.3\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"libqt3-i18n\", pkgver:\"3.3.6-3ubuntu3.3\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"libqt3-mt\", pkgver:\"3:3.3.6-3ubuntu3.3\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"libqt3-mt-dev\", pkgver:\"3.3.6-3ubuntu3.3\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"libqt3-mt-mysql\", pkgver:\"3.3.6-3ubuntu3.3\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"libqt3-mt-odbc\", pkgver:\"3.3.6-3ubuntu3.3\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"libqt3-mt-psql\", pkgver:\"3.3.6-3ubuntu3.3\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"libqt3-mt-sqlite\", pkgver:\"3.3.6-3ubuntu3.3\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"qt-x11-free-dbg\", pkgver:\"3.3.6-3ubuntu3.3\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"qt3-apps-dev\", pkgver:\"3.3.6-3ubuntu3.3\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"qt3-assistant\", pkgver:\"3.3.6-3ubuntu3.3\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"qt3-designer\", pkgver:\"3.3.6-3ubuntu3.3\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"qt3-dev-tools\", pkgver:\"3.3.6-3ubuntu3.3\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"qt3-dev-tools-compat\", pkgver:\"3.3.6-3ubuntu3.3\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"qt3-dev-tools-embedded\", pkgver:\"3.3.6-3ubuntu3.3\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"qt3-doc\", pkgver:\"3.3.6-3ubuntu3.3\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"qt3-examples\", pkgver:\"3.3.6-3ubuntu3.3\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"qt3-linguist\", pkgver:\"3.3.6-3ubuntu3.3\")) flag++;\nif (ubuntu_check(osver:\"6.10\", pkgname:\"qt3-qtconfig\", pkgver:\"3.3.6-3ubuntu3.3\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"libqt3-compat-headers\", pkgver:\"3.3.8really3.3.7-0ubuntu5.2\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"libqt3-headers\", pkgver:\"3.3.8really3.3.7-0ubuntu5.2\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"libqt3-i18n\", pkgver:\"3.3.8really3.3.7-0ubuntu5.2\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"libqt3-mt\", pkgver:\"3:3.3.8really3.3.7-0ubuntu5.2\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"libqt3-mt-dev\", pkgver:\"3.3.8really3.3.7-0ubuntu5.2\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"libqt3-mt-mysql\", pkgver:\"3.3.8really3.3.7-0ubuntu5.2\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"libqt3-mt-odbc\", pkgver:\"3.3.8really3.3.7-0ubuntu5.2\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"libqt3-mt-psql\", pkgver:\"3.3.8really3.3.7-0ubuntu5.2\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"libqt3-mt-sqlite\", pkgver:\"3.3.8really3.3.7-0ubuntu5.2\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"qt-x11-free-dbg\", pkgver:\"3.3.8really3.3.7-0ubuntu5.2\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"qt3-apps-dev\", pkgver:\"3.3.8really3.3.7-0ubuntu5.2\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"qt3-assistant\", pkgver:\"3.3.8really3.3.7-0ubuntu5.2\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"qt3-designer\", pkgver:\"3.3.8really3.3.7-0ubuntu5.2\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"qt3-dev-tools\", pkgver:\"3.3.8really3.3.7-0ubuntu5.2\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"qt3-dev-tools-compat\", pkgver:\"3.3.8really3.3.7-0ubuntu5.2\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"qt3-dev-tools-embedded\", pkgver:\"3.3.8really3.3.7-0ubuntu5.2\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"qt3-doc\", pkgver:\"3.3.8really3.3.7-0ubuntu5.2\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"qt3-examples\", pkgver:\"3.3.8really3.3.7-0ubuntu5.2\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"qt3-linguist\", pkgver:\"3.3.8really3.3.7-0ubuntu5.2\")) flag++;\nif (ubuntu_check(osver:\"7.04\", pkgname:\"qt3-qtconfig\", pkgver:\"3.3.8really3.3.7-0ubuntu5.2\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"libqt3-compat-headers / libqt3-headers / libqt3-i18n / libqt3-mt / etc\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T13:13:31", "description": "This update fixes a buffer overflow in qt3 while handling UTF8 characters. (CVE-2007-4137)", "cvss3": {"score": null, "vector": null}, "published": "2007-10-17T00:00:00", "type": "nessus", "title": "openSUSE 10 Security Update : qt3 (qt3-4421)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2007-4137"], "modified": "2021-01-14T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:qt3", "p-cpe:/a:novell:opensuse:qt3-32bit", "p-cpe:/a:novell:opensuse:qt3-devel", "p-cpe:/a:novell:opensuse:qt3-devel-32bit", "p-cpe:/a:novell:opensuse:qt3-devel-tools", "p-cpe:/a:novell:opensuse:qt3-static", "cpe:/o:novell:opensuse:10.1", "cpe:/o:novell:opensuse:10.2"], "id": "SUSE_QT3-4421.NASL", "href": "https://www.tenable.com/plugins/nessus/27415", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update qt3-4421.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(27415);\n script_version(\"1.14\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2007-4137\");\n\n script_name(english:\"openSUSE 10 Security Update : qt3 (qt3-4421)\");\n script_summary(english:\"Check for the qt3-4421 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update fixes a buffer overflow in qt3 while handling UTF8\ncharacters. (CVE-2007-4137)\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected qt3 packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_cwe_id(119);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:qt3\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:qt3-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:qt3-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:qt3-devel-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:qt3-devel-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:qt3-static\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:10.1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:10.2\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2007/09/19\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2007/10/17\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2007-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE10\\.1|SUSE10\\.2)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"10.1 / 10.2\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE10.1\", reference:\"qt3-3.3.5-58.32\") ) flag++;\nif ( rpm_check(release:\"SUSE10.1\", reference:\"qt3-devel-3.3.5-58.32\") ) flag++;\nif ( rpm_check(release:\"SUSE10.1\", reference:\"qt3-devel-tools-3.3.5-58.29\") ) flag++;\nif ( rpm_check(release:\"SUSE10.1\", reference:\"qt3-static-3.3.5-58.26\") ) flag++;\nif ( rpm_check(release:\"SUSE10.1\", cpu:\"x86_64\", reference:\"qt3-32bit-3.3.5-58.32\") ) flag++;\nif ( rpm_check(release:\"SUSE10.1\", cpu:\"x86_64\", reference:\"qt3-devel-32bit-3.3.5-58.32\") ) flag++;\nif ( rpm_check(release:\"SUSE10.2\", reference:\"qt3-3.3.7-18\") ) flag++;\nif ( rpm_check(release:\"SUSE10.2\", reference:\"qt3-devel-3.3.7-18\") ) flag++;\nif ( rpm_check(release:\"SUSE10.2\", reference:\"qt3-devel-tools-3.3.7-16\") ) flag++;\nif ( rpm_check(release:\"SUSE10.2\", reference:\"qt3-static-3.3.7-19\") ) flag++;\nif ( rpm_check(release:\"SUSE10.2\", cpu:\"x86_64\", reference:\"qt3-32bit-3.3.7-18\") ) flag++;\nif ( rpm_check(release:\"SUSE10.2\", cpu:\"x86_64\", reference:\"qt3-devel-32bit-3.3.7-18\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"qt3 / qt3-32bit / qt3-devel / qt3-devel-32bit / qt3-devel-tools / etc\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T13:13:36", "description": "A buffer overflow was found in how Qt expanded malformed Unicode strings. If an application linked against Qt parsed a malicious Unicode string, it could lead to a denial of service or potentially allow for the execution of arbitrary code.\n\nUpdated packages have been patched to prevent this issue. Although the problem is not exploitable in Qt4, patched packages have been issued regardless.", "cvss3": {"score": null, "vector": null}, "published": "2007-09-14T00:00:00", "type": "nessus", "title": "Mandrake Linux Security Advisory : qt (MDKSA-2007:183)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2007-4137"], "modified": "2021-01-06T00:00:00", "cpe": ["p-cpe:/a:mandriva:linux:lib64designercore1", "p-cpe:/a:mandriva:linux:lib64editor1", "p-cpe:/a:mandriva:linux:lib64qassistant1", "p-cpe:/a:mandriva:linux:lib64qassistantclient1", "p-cpe:/a:mandriva:linux:lib64qt3", "p-cpe:/a:mandriva:linux:lib64qt3-devel", "p-cpe:/a:mandriva:linux:lib64qt3-mysql", "p-cpe:/a:mandriva:linux:lib64qt3-odbc", "p-cpe:/a:mandriva:linux:lib64qt3-psql", "p-cpe:/a:mandriva:linux:lib64qt3-sqlite", "p-cpe:/a:mandriva:linux:lib64qt3-static-devel", "p-cpe:/a:mandriva:linux:lib64qt3support4", "p-cpe:/a:mandriva:linux:lib64qt4-devel", "p-cpe:/a:mandriva:linux:lib64qtcore4", "p-cpe:/a:mandriva:linux:lib64qtdbus4", "p-cpe:/a:mandriva:linux:lib64qtdesigner1", "p-cpe:/a:mandriva:linux:lib64qtgui4", "p-cpe:/a:mandriva:linux:lib64qtnetwork4", "p-cpe:/a:mandriva:linux:lib64qtopengl4", "p-cpe:/a:mandriva:linux:lib64qtsql4", "p-cpe:/a:mandriva:linux:lib64qtsvg4", "p-cpe:/a:mandriva:linux:lib64qttest4", "p-cpe:/a:mandriva:linux:lib64qtuitools4", "p-cpe:/a:mandriva:linux:lib64qtxml4", "p-cpe:/a:mandriva:linux:libdesignercore1", "p-cpe:/a:mandriva:linux:libeditor1", "p-cpe:/a:mandriva:linux:libqassistant1", "p-cpe:/a:mandriva:linux:libqassistantclient1", "p-cpe:/a:mandriva:linux:libqt3", "p-cpe:/a:mandriva:linux:libqt3-devel", "p-cpe:/a:mandriva:linux:libqt3-mysql", "p-cpe:/a:mandriva:linux:libqt3-odbc", "p-cpe:/a:mandriva:linux:libqt3-psql", "p-cpe:/a:mandriva:linux:libqt3-sqlite", "p-cpe:/a:mandriva:linux:libqt3-static-devel", "p-cpe:/a:mandriva:linux:libqt3support4", "p-cpe:/a:mandriva:linux:libqt4-devel", "p-cpe:/a:mandriva:linux:libqtcore4", "p-cpe:/a:mandriva:linux:libqtdbus4", "p-cpe:/a:mandriva:linux:libqtdesigner1", "p-cpe:/a:mandriva:linux:libqtgui4", "p-cpe:/a:mandriva:linux:libqtnetwork4", "p-cpe:/a:mandriva:linux:libqtopengl4", "p-cpe:/a:mandriva:linux:libqtsql4", "p-cpe:/a:mandriva:linux:libqtsvg4", "p-cpe:/a:mandriva:linux:libqttest4", "p-cpe:/a:mandriva:linux:libqtuitools4", "p-cpe:/a:mandriva:linux:libqtxml4", "p-cpe:/a:mandriva:linux:qt3-common", "p-cpe:/a:mandriva:linux:qt3-doc", "p-cpe:/a:mandriva:linux:qt3-example", "p-cpe:/a:mandriva:linux:qt3-tutorial", "p-cpe:/a:mandriva:linux:qt4-accessibility-plugin-lib", "p-cpe:/a:mandriva:linux:qt4-accessibility-plugin-lib64", "p-cpe:/a:mandriva:linux:qt4-assistant", "p-cpe:/a:mandriva:linux:qt4-codecs-plugin-lib", "p-cpe:/a:mandriva:linux:qt4-codecs-plugin-lib64", "p-cpe:/a:mandriva:linux:qt4-common", "p-cpe:/a:mandriva:linux:qt4-database-plugin-mysql-lib", "p-cpe:/a:mandriva:linux:qt4-database-plugin-mysql-lib64", "p-cpe:/a:mandriva:linux:qt4-database-plugin-odbc-lib", "p-cpe:/a:mandriva:linux:qt4-database-plugin-odbc-lib64", "p-cpe:/a:mandriva:linux:qt4-database-plugin-pgsql-lib", "p-cpe:/a:mandriva:linux:qt4-database-plugin-pgsql-lib64", "p-cpe:/a:mandriva:linux:qt4-database-plugin-sqlite-lib", "p-cpe:/a:mandriva:linux:qt4-database-plugin-sqlite-lib64", "p-cpe:/a:mandriva:linux:qt4-designer", "p-cpe:/a:mandriva:linux:qt4-doc", "p-cpe:/a:mandriva:linux:qt4-examples", "p-cpe:/a:mandriva:linux:qt4-linguist", "p-cpe:/a:mandriva:linux:qt4-qvfb", "p-cpe:/a:mandriva:linux:qt4-tutorial", "cpe:/o:mandriva:linux:2007", "cpe:/o:mandriva:linux:2007.1"], "id": "MANDRAKE_MDKSA-2007-183.NASL", "href": "https://www.tenable.com/plugins/nessus/26049", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Mandrake Linux Security Advisory MDKSA-2007:183. \n# The text itself is copyright (C) Mandriva S.A.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(26049);\n script_version(\"1.17\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2007-4137\");\n script_bugtraq_id(25657);\n script_xref(name:\"MDKSA\", value:\"2007:183\");\n\n script_name(english:\"Mandrake Linux Security Advisory : qt (MDKSA-2007:183)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Mandrake Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"A buffer overflow was found in how Qt expanded malformed Unicode\nstrings. If an application linked against Qt parsed a malicious\nUnicode string, it could lead to a denial of service or potentially\nallow for the execution of arbitrary code.\n\nUpdated packages have been patched to prevent this issue. Although the\nproblem is not exploitable in Qt4, patched packages have been issued\nregardless.\"\n );\n # http://trolltech.com/company/newsroom/announcements/press.2007-09-03.7564032119\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?6fbb01c0\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:ND/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(119);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64designercore1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64editor1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64qassistant1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64qassistantclient1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64qt3\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64qt3-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64qt3-mysql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64qt3-odbc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64qt3-psql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64qt3-sqlite\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64qt3-static-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64qt3support4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64qt4-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64qtcore4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64qtdbus4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64qtdesigner1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64qtgui4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64qtnetwork4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64qtopengl4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64qtsql4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64qtsvg4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64qttest4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64qtuitools4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:lib64qtxml4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libdesignercore1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libeditor1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libqassistant1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libqassistantclient1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libqt3\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libqt3-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libqt3-mysql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libqt3-odbc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libqt3-psql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libqt3-sqlite\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libqt3-static-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libqt3support4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libqt4-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libqtcore4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libqtdbus4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libqtdesigner1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libqtgui4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libqtnetwork4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libqtopengl4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libqtsql4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libqtsvg4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libqttest4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libqtuitools4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:libqtxml4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:qt3-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:qt3-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:qt3-example\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:qt3-tutorial\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:qt4-accessibility-plugin-lib\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:qt4-accessibility-plugin-lib64\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:qt4-assistant\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:qt4-codecs-plugin-lib\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:qt4-codecs-plugin-lib64\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:qt4-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:qt4-database-plugin-mysql-lib\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:qt4-database-plugin-mysql-lib64\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:qt4-database-plugin-odbc-lib\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:qt4-database-plugin-odbc-lib64\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:qt4-database-plugin-pgsql-lib\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:qt4-database-plugin-pgsql-lib64\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:qt4-database-plugin-sqlite-lib\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:qt4-database-plugin-sqlite-lib64\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:qt4-designer\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:qt4-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:qt4-examples\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:qt4-linguist\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:qt4-qvfb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:qt4-tutorial\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:linux:2007\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandriva:linux:2007.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2007/09/13\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2007/09/14\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2007-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Mandriva Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/Mandrake/release\", \"Host/Mandrake/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Mandrake/release\")) audit(AUDIT_OS_NOT, \"Mandriva / Mandake Linux\");\nif (!get_kb_item(\"Host/Mandrake/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^(amd64|i[3-6]86|x86_64)$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Mandriva / Mandrake Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"MDK2007.0\", cpu:\"x86_64\", reference:\"lib64designercore1-3.3.6-18.4mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", cpu:\"x86_64\", reference:\"lib64editor1-3.3.6-18.4mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", cpu:\"x86_64\", reference:\"lib64qassistant1-4.1.4-12.3mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", cpu:\"x86_64\", reference:\"lib64qassistantclient1-3.3.6-18.4mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", cpu:\"x86_64\", reference:\"lib64qt3-3.3.6-18.4mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", cpu:\"x86_64\", reference:\"lib64qt3-devel-3.3.6-18.4mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", cpu:\"x86_64\", reference:\"lib64qt3-mysql-3.3.6-18.4mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", cpu:\"x86_64\", reference:\"lib64qt3-odbc-3.3.6-18.4mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", cpu:\"x86_64\", reference:\"lib64qt3-psql-3.3.6-18.4mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", cpu:\"x86_64\", reference:\"lib64qt3-sqlite-3.3.6-18.4mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", cpu:\"x86_64\", reference:\"lib64qt3-static-devel-3.3.6-18.4mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", cpu:\"x86_64\", reference:\"lib64qt3support4-4.1.4-12.3mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", cpu:\"x86_64\", reference:\"lib64qt4-devel-4.1.4-12.3mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", cpu:\"x86_64\", reference:\"lib64qtcore4-4.1.4-12.3mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", cpu:\"x86_64\", reference:\"lib64qtdesigner1-4.1.4-12.3mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", cpu:\"x86_64\", reference:\"lib64qtgui4-4.1.4-12.3mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", cpu:\"x86_64\", reference:\"lib64qtnetwork4-4.1.4-12.3mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", cpu:\"x86_64\", reference:\"lib64qtopengl4-4.1.4-12.3mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", cpu:\"x86_64\", reference:\"lib64qtsql4-4.1.4-12.3mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", cpu:\"x86_64\", reference:\"lib64qtsvg4-4.1.4-12.3mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", cpu:\"x86_64\", reference:\"lib64qttest4-4.1.4-12.3mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", cpu:\"x86_64\", reference:\"lib64qtuitools4-4.1.4-12.3mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", cpu:\"x86_64\", reference:\"lib64qtxml4-4.1.4-12.3mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", cpu:\"i386\", reference:\"libdesignercore1-3.3.6-18.4mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", cpu:\"i386\", reference:\"libeditor1-3.3.6-18.4mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", cpu:\"i386\", reference:\"libqassistant1-4.1.4-12.3mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", cpu:\"i386\", reference:\"libqassistantclient1-3.3.6-18.4mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", cpu:\"i386\", reference:\"libqt3-3.3.6-18.4mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", cpu:\"i386\", reference:\"libqt3-devel-3.3.6-18.4mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", cpu:\"i386\", reference:\"libqt3-mysql-3.3.6-18.4mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", cpu:\"i386\", reference:\"libqt3-odbc-3.3.6-18.4mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", cpu:\"i386\", reference:\"libqt3-psql-3.3.6-18.4mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", cpu:\"i386\", reference:\"libqt3-sqlite-3.3.6-18.4mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", cpu:\"i386\", reference:\"libqt3-static-devel-3.3.6-18.4mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", cpu:\"i386\", reference:\"libqt3support4-4.1.4-12.3mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", cpu:\"i386\", reference:\"libqt4-devel-4.1.4-12.3mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", cpu:\"i386\", reference:\"libqtcore4-4.1.4-12.3mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", cpu:\"i386\", reference:\"libqtdesigner1-4.1.4-12.3mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", cpu:\"i386\", reference:\"libqtgui4-4.1.4-12.3mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", cpu:\"i386\", reference:\"libqtnetwork4-4.1.4-12.3mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", cpu:\"i386\", reference:\"libqtopengl4-4.1.4-12.3mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", cpu:\"i386\", reference:\"libqtsql4-4.1.4-12.3mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", cpu:\"i386\", reference:\"libqtsvg4-4.1.4-12.3mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", cpu:\"i386\", reference:\"libqttest4-4.1.4-12.3mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", cpu:\"i386\", reference:\"libqtuitools4-4.1.4-12.3mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", cpu:\"i386\", reference:\"libqtxml4-4.1.4-12.3mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", reference:\"qt3-common-3.3.6-18.4mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", reference:\"qt3-doc-3.3.6-18.4mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", reference:\"qt3-example-3.3.6-18.4mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", reference:\"qt3-tutorial-3.3.6-18.4mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", cpu:\"i386\", reference:\"qt4-accessibility-plugin-lib-4.1.4-12.3mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", cpu:\"x86_64\", reference:\"qt4-accessibility-plugin-lib64-4.1.4-12.3mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", reference:\"qt4-assistant-4.1.4-12.3mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", reference:\"qt4-common-4.1.4-12.3mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", cpu:\"i386\", reference:\"qt4-database-plugin-mysql-lib-4.1.4-12.3mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", cpu:\"x86_64\", reference:\"qt4-database-plugin-mysql-lib64-4.1.4-12.3mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", cpu:\"i386\", reference:\"qt4-database-plugin-odbc-lib-4.1.4-12.3mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", cpu:\"x86_64\", reference:\"qt4-database-plugin-odbc-lib64-4.1.4-12.3mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", cpu:\"i386\", reference:\"qt4-database-plugin-pgsql-lib-4.1.4-12.3mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", cpu:\"x86_64\", reference:\"qt4-database-plugin-pgsql-lib64-4.1.4-12.3mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", cpu:\"i386\", reference:\"qt4-database-plugin-sqlite-lib-4.1.4-12.3mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", cpu:\"x86_64\", reference:\"qt4-database-plugin-sqlite-lib64-4.1.4-12.3mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", reference:\"qt4-designer-4.1.4-12.3mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", reference:\"qt4-doc-4.1.4-12.3mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", reference:\"qt4-examples-4.1.4-12.3mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", reference:\"qt4-linguist-4.1.4-12.3mdv2007.0\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.0\", reference:\"qt4-tutorial-4.1.4-12.3mdv2007.0\", yank:\"mdv\")) flag++;\n\nif (rpm_check(release:\"MDK2007.1\", cpu:\"x86_64\", reference:\"lib64designercore1-3.3.8-4.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"x86_64\", reference:\"lib64editor1-3.3.8-4.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"x86_64\", reference:\"lib64qassistant1-4.2.3-3.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"x86_64\", reference:\"lib64qassistantclient1-3.3.8-4.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"x86_64\", reference:\"lib64qt3-3.3.8-4.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"x86_64\", reference:\"lib64qt3-devel-3.3.8-4.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"x86_64\", reference:\"lib64qt3-mysql-3.3.8-4.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"x86_64\", reference:\"lib64qt3-odbc-3.3.8-4.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"x86_64\", reference:\"lib64qt3-psql-3.3.8-4.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"x86_64\", reference:\"lib64qt3-sqlite-3.3.8-4.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"x86_64\", reference:\"lib64qt3-static-devel-3.3.8-4.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"x86_64\", reference:\"lib64qt3support4-4.2.3-3.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"x86_64\", reference:\"lib64qt4-devel-4.2.3-3.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"x86_64\", reference:\"lib64qtcore4-4.2.3-3.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"x86_64\", reference:\"lib64qtdbus4-4.2.3-3.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"x86_64\", reference:\"lib64qtdesigner1-4.2.3-3.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"x86_64\", reference:\"lib64qtgui4-4.2.3-3.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"x86_64\", reference:\"lib64qtnetwork4-4.2.3-3.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"x86_64\", reference:\"lib64qtopengl4-4.2.3-3.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"x86_64\", reference:\"lib64qtsql4-4.2.3-3.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"x86_64\", reference:\"lib64qtsvg4-4.2.3-3.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"x86_64\", reference:\"lib64qttest4-4.2.3-3.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"x86_64\", reference:\"lib64qtuitools4-4.2.3-3.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"x86_64\", reference:\"lib64qtxml4-4.2.3-3.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"i386\", reference:\"libdesignercore1-3.3.8-4.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"i386\", reference:\"libeditor1-3.3.8-4.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"i386\", reference:\"libqassistant1-4.2.3-3.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"i386\", reference:\"libqassistantclient1-3.3.8-4.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"i386\", reference:\"libqt3-3.3.8-4.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"i386\", reference:\"libqt3-devel-3.3.8-4.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"i386\", reference:\"libqt3-mysql-3.3.8-4.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"i386\", reference:\"libqt3-odbc-3.3.8-4.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"i386\", reference:\"libqt3-psql-3.3.8-4.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"i386\", reference:\"libqt3-sqlite-3.3.8-4.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"i386\", reference:\"libqt3-static-devel-3.3.8-4.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"i386\", reference:\"libqt3support4-4.2.3-3.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"i386\", reference:\"libqt4-devel-4.2.3-3.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"i386\", reference:\"libqtcore4-4.2.3-3.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"i386\", reference:\"libqtdbus4-4.2.3-3.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"i386\", reference:\"libqtdesigner1-4.2.3-3.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"i386\", reference:\"libqtgui4-4.2.3-3.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"i386\", reference:\"libqtnetwork4-4.2.3-3.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"i386\", reference:\"libqtopengl4-4.2.3-3.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"i386\", reference:\"libqtsql4-4.2.3-3.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"i386\", reference:\"libqtsvg4-4.2.3-3.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"i386\", reference:\"libqttest4-4.2.3-3.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"i386\", reference:\"libqtuitools4-4.2.3-3.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"i386\", reference:\"libqtxml4-4.2.3-3.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", reference:\"qt3-common-3.3.8-4.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", reference:\"qt3-doc-3.3.8-4.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", reference:\"qt3-example-3.3.8-4.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", reference:\"qt3-tutorial-3.3.8-4.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"i386\", reference:\"qt4-accessibility-plugin-lib-4.2.3-3.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"x86_64\", reference:\"qt4-accessibility-plugin-lib64-4.2.3-3.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", reference:\"qt4-assistant-4.2.3-3.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"i386\", reference:\"qt4-codecs-plugin-lib-4.2.3-3.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"x86_64\", reference:\"qt4-codecs-plugin-lib64-4.2.3-3.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", reference:\"qt4-common-4.2.3-3.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"i386\", reference:\"qt4-database-plugin-mysql-lib-4.2.3-3.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"x86_64\", reference:\"qt4-database-plugin-mysql-lib64-4.2.3-3.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"i386\", reference:\"qt4-database-plugin-odbc-lib-4.2.3-3.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"x86_64\", reference:\"qt4-database-plugin-odbc-lib64-4.2.3-3.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"i386\", reference:\"qt4-database-plugin-pgsql-lib-4.2.3-3.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"x86_64\", reference:\"qt4-database-plugin-pgsql-lib64-4.2.3-3.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"i386\", reference:\"qt4-database-plugin-sqlite-lib-4.2.3-3.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", cpu:\"x86_64\", reference:\"qt4-database-plugin-sqlite-lib64-4.2.3-3.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", reference:\"qt4-designer-4.2.3-3.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", reference:\"qt4-doc-4.2.3-3.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", reference:\"qt4-examples-4.2.3-3.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", reference:\"qt4-linguist-4.2.3-3.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", reference:\"qt4-qvfb-4.2.3-3.2mdv2007.1\", yank:\"mdv\")) flag++;\nif (rpm_check(release:\"MDK2007.1\", reference:\"qt4-tutorial-4.2.3-3.2mdv2007.1\", yank:\"mdv\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T13:12:50", "description": "The remote host is affected by the vulnerability described in GLSA-200710-28 (Qt: Buffer overflow)\n\n Dirk Mueller from the KDE development team discovered a boundary error in file qutfcodec.cpp when processing Unicode strings.\n Impact :\n\n A remote attacker could send a specially crafted Unicode string to a vulnerable Qt application, possibly resulting in the remote execution of arbitrary code with the privileges of the user running the application. Note that the boundary error is present but reported to be not exploitable in 4.x series.\n Workaround :\n\n There is no known workaround at this time.", "cvss3": {"score": null, "vector": null}, "published": "2007-10-26T00:00:00", "type": "nessus", "title": "GLSA-200710-28 : Qt: Buffer overflow", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2007-4137"], "modified": "2021-01-06T00:00:00", "cpe": ["p-cpe:/a:gentoo:linux:qt", "cpe:/o:gentoo:linux"], "id": "GENTOO_GLSA-200710-28.NASL", "href": "https://www.tenable.com/plugins/nessus/27579", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Gentoo Linux Security Advisory GLSA 200710-28.\n#\n# The advisory text is Copyright (C) 2001-2015 Gentoo Foundation, Inc.\n# and licensed under the Creative Commons - Attribution / Share Alike \n# license. See http://creativecommons.org/licenses/by-sa/3.0/\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(27579);\n script_version(\"1.15\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2007-4137\");\n script_xref(name:\"GLSA\", value:\"200710-28\");\n\n script_name(english:\"GLSA-200710-28 : Qt: Buffer overflow\");\n script_summary(english:\"Checks for updated package(s) in /var/db/pkg\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Gentoo host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote host is affected by the vulnerability described in GLSA-200710-28\n(Qt: Buffer overflow)\n\n Dirk Mueller from the KDE development team discovered a boundary error\n in file qutfcodec.cpp when processing Unicode strings.\n \nImpact :\n\n A remote attacker could send a specially crafted Unicode string to a\n vulnerable Qt application, possibly resulting in the remote execution\n of arbitrary code with the privileges of the user running the\n application. Note that the boundary error is present but reported to be\n not exploitable in 4.x series.\n \nWorkaround :\n\n There is no known workaround at this time.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security.gentoo.org/glsa/200710-28\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"All Qt 3.x users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=x11-libs/qt-3.3.8-r4'\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_cwe_id(119);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:qt\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:gentoo:linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2007/10/25\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2007/10/26\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2007-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Gentoo Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Gentoo/release\", \"Host/Gentoo/qpkg-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"qpkg.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Gentoo/release\")) audit(AUDIT_OS_NOT, \"Gentoo\");\nif (!get_kb_item(\"Host/Gentoo/qpkg-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (qpkg_check(package:\"x11-libs/qt\", unaffected:make_list(\"ge 3.3.8-r4\"), vulnerable:make_list(\"lt 3.3.8-r4\"))) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = qpkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"Qt\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T13:13:38", "description": "Updated qt packages that correct two security flaws are now available.\n\nThis update has been rated as having important security impact by the Red Hat Security Response Team.\n\nQt is a software toolkit that simplifies the task of writing and maintaining GUI (Graphical User Interface) applications for the X Window System.\n\nA flaw was found in the way Qt expanded certain UTF8 characters. It was possible to prevent a Qt-based application from properly sanitizing user-supplied input. This could, for example, result in a cross-site scripting attack against the Konqueror web browser.\n(CVE-2007-0242)\n\nA buffer overflow flaw was found in the way Qt expanded malformed Unicode strings. If an application linked against Qt parsed a malicious Unicode string, it could lead to a denial of service or possibly allow the execution of arbitrary code. (CVE-2007-4137)\n\nUsers of Qt should upgrade to these updated packages, which contain a backported patch to correct these issues.", "cvss3": {"score": null, "vector": null}, "published": "2007-09-14T00:00:00", "type": "nessus", "title": "CentOS 3 / 4 / 5 : qt (CESA-2007:0883)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2007-0242", "CVE-2007-4137"], "modified": "2021-01-04T00:00:00", "cpe": ["p-cpe:/a:centos:centos:qt", "p-cpe:/a:centos:centos:qt-MySQL", "p-cpe:/a:centos:centos:qt-ODBC", "p-cpe:/a:centos:centos:qt-PostgreSQL", "p-cpe:/a:centos:centos:qt-config", "p-cpe:/a:centos:centos:qt-designer", "p-cpe:/a:centos:centos:qt-devel", "p-cpe:/a:centos:centos:qt-devel-docs", "cpe:/o:centos:centos:3", "cpe:/o:centos:centos:4", "cpe:/o:centos:centos:5"], "id": "CENTOS_RHSA-2007-0883.NASL", "href": "https://www.tenable.com/plugins/nessus/26028", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2007:0883 and \n# CentOS Errata and Security Advisory 2007:0883 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(26028);\n script_version(\"1.22\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2007-0242\", \"CVE-2007-4137\");\n script_bugtraq_id(23269, 25657);\n script_xref(name:\"RHSA\", value:\"2007:0883\");\n\n script_name(english:\"CentOS 3 / 4 / 5 : qt (CESA-2007:0883)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote CentOS host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated qt packages that correct two security flaws are now available.\n\nThis update has been rated as having important security impact by the\nRed Hat Security Response Team.\n\nQt is a software toolkit that simplifies the task of writing and\nmaintaining GUI (Graphical User Interface) applications for the X\nWindow System.\n\nA flaw was found in the way Qt expanded certain UTF8 characters. It\nwas possible to prevent a Qt-based application from properly\nsanitizing user-supplied input. This could, for example, result in a\ncross-site scripting attack against the Konqueror web browser.\n(CVE-2007-0242)\n\nA buffer overflow flaw was found in the way Qt expanded malformed\nUnicode strings. If an application linked against Qt parsed a\nmalicious Unicode string, it could lead to a denial of service or\npossibly allow the execution of arbitrary code. (CVE-2007-4137)\n\nUsers of Qt should upgrade to these updated packages, which contain a\nbackported patch to correct these issues.\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2007-September/014190.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?5f79cf04\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2007-September/014191.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?dfa694ad\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2007-September/014192.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?94ca4688\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2007-September/014193.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?cb2cbee7\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2007-September/014194.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?ec2ad63b\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2007-September/014195.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?cdcf183a\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2007-September/014235.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?60627ecc\"\n );\n # https://lists.centos.org/pipermail/centos-announce/2007-September/014236.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?967ce360\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected qt packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(119);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:qt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:qt-MySQL\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:qt-ODBC\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:qt-PostgreSQL\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:qt-config\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:qt-designer\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:qt-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:qt-devel-docs\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:3\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:4\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:5\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2007/04/03\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2007/09/13\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2007/09/14\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2007-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"CentOS Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/CentOS/release\");\nif (isnull(release) || \"CentOS\" >!< release) audit(AUDIT_OS_NOT, \"CentOS\");\nos_ver = pregmatch(pattern: \"CentOS(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"CentOS\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(3|4|5)([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"CentOS 3.x / 4.x / 5.x\", \"CentOS \" + os_ver);\n\nif (!get_kb_item(\"Host/CentOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && \"ia64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"CentOS\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"CentOS-3\", reference:\"qt-3.1.2-17.RHEL3\")) flag++;\nif (rpm_check(release:\"CentOS-3\", reference:\"qt-MySQL-3.1.2-17.RHEL3\")) flag++;\nif (rpm_check(release:\"CentOS-3\", reference:\"qt-ODBC-3.1.2-17.RHEL3\")) flag++;\nif (rpm_check(release:\"CentOS-3\", reference:\"qt-PostgreSQL-3.1.2-17.RHEL3\")) flag++;\nif (rpm_check(release:\"CentOS-3\", reference:\"qt-config-3.1.2-17.RHEL3\")) flag++;\nif (rpm_check(release:\"CentOS-3\", reference:\"qt-designer-3.1.2-17.RHEL3\")) flag++;\nif (rpm_check(release:\"CentOS-3\", reference:\"qt-devel-3.1.2-17.RHEL3\")) flag++;\n\nif (rpm_check(release:\"CentOS-4\", reference:\"qt-3.3.3-13.RHEL4\")) flag++;\nif (rpm_check(release:\"CentOS-4\", reference:\"qt-MySQL-3.3.3-13.RHEL4\")) flag++;\nif (rpm_check(release:\"CentOS-4\", reference:\"qt-ODBC-3.3.3-13.RHEL4\")) flag++;\nif (rpm_check(release:\"CentOS-4\", reference:\"qt-PostgreSQL-3.3.3-13.RHEL4\")) flag++;\nif (rpm_check(release:\"CentOS-4\", reference:\"qt-config-3.3.3-13.RHEL4\")) flag++;\nif (rpm_check(release:\"CentOS-4\", reference:\"qt-designer-3.3.3-13.RHEL4\")) flag++;\nif (rpm_check(release:\"CentOS-4\", reference:\"qt-devel-3.3.3-13.RHEL4\")) flag++;\n\nif (rpm_check(release:\"CentOS-5\", reference:\"qt-3.3.6-23.el5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"qt-MySQL-3.3.6-23.el5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"qt-ODBC-3.3.6-23.el5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"qt-PostgreSQL-3.3.6-23.el5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"qt-config-3.3.6-23.el5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"qt-designer-3.3.6-23.el5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"qt-devel-3.3.6-23.el5\")) flag++;\nif (rpm_check(release:\"CentOS-5\", reference:\"qt-devel-docs-3.3.6-23.el5\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"qt / qt-MySQL / qt-ODBC / qt-PostgreSQL / qt-config / qt-designer / etc\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T13:13:36", "description": "Updated qt packages that correct two security flaws are now available.\n\nThis update has been rated as having important security impact by the Red Hat Security Response Team.\n\nQt is a software toolkit that simplifies the task of writing and maintaining GUI (Graphical User Interface) applications for the X Window System.\n\nA flaw was found in the way Qt expanded certain UTF8 characters. It was possible to prevent a Qt-based application from properly sanitizing user-supplied input. This could, for example, result in a cross-site scripting attack against the Konqueror web browser.\n(CVE-2007-0242)\n\nA buffer overflow flaw was found in the way Qt expanded malformed Unicode strings. If an application linked against Qt parsed a malicious Unicode string, it could lead to a denial of service or possibly allow the execution of arbitrary code. (CVE-2007-4137)\n\nUsers of Qt should upgrade to these updated packages, which contain a backported patch to correct these issues.", "cvss3": {"score": null, "vector": null}, "published": "2007-09-14T00:00:00", "type": "nessus", "title": "RHEL 2.1 / 3 / 4 / 5 : qt (RHSA-2007:0883)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2007-0242", "CVE-2007-4137"], "modified": "2021-01-14T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:qt", "p-cpe:/a:redhat:enterprise_linux:qt-MySQL", "p-cpe:/a:redhat:enterprise_linux:qt-ODBC", "p-cpe:/a:redhat:enterprise_linux:qt-PostgreSQL", "p-cpe:/a:redhat:enterprise_linux:qt-Xt", "p-cpe:/a:redhat:enterprise_linux:qt-config", "p-cpe:/a:redhat:enterprise_linux:qt-designer", "p-cpe:/a:redhat:enterprise_linux:qt-devel", "p-cpe:/a:redhat:enterprise_linux:qt-devel-docs", "p-cpe:/a:redhat:enterprise_linux:qt-static", "cpe:/o:redhat:enterprise_linux:2.1", "cpe:/o:redhat:enterprise_linux:3", "cpe:/o:redhat:enterprise_linux:4", "cpe:/o:redhat:enterprise_linux:4.5", "cpe:/o:redhat:enterprise_linux:5"], "id": "REDHAT-RHSA-2007-0883.NASL", "href": "https://www.tenable.com/plugins/nessus/26051", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2007:0883. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(26051);\n script_version(\"1.29\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2007-0242\", \"CVE-2007-4137\");\n script_bugtraq_id(23269, 25657);\n script_xref(name:\"RHSA\", value:\"2007:0883\");\n\n script_name(english:\"RHEL 2.1 / 3 / 4 / 5 : qt (RHSA-2007:0883)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Updated qt packages that correct two security flaws are now available.\n\nThis update has been rated as having important security impact by the\nRed Hat Security Response Team.\n\nQt is a software toolkit that simplifies the task of writing and\nmaintaining GUI (Graphical User Interface) applications for the X\nWindow System.\n\nA flaw was found in the way Qt expanded certain UTF8 characters. It\nwas possible to prevent a Qt-based application from properly\nsanitizing user-supplied input. This could, for example, result in a\ncross-site scripting attack against the Konqueror web browser.\n(CVE-2007-0242)\n\nA buffer overflow flaw was found in the way Qt expanded malformed\nUnicode strings. If an application linked against Qt parsed a\nmalicious Unicode string, it could lead to a denial of service or\npossibly allow the execution of arbitrary code. (CVE-2007-4137)\n\nUsers of Qt should upgrade to these updated packages, which contain a\nbackported patch to correct these issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2007-0242\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2007-4137\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2007:0883\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(119);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:qt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:qt-MySQL\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:qt-ODBC\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:qt-PostgreSQL\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:qt-Xt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:qt-config\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:qt-designer\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:qt-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:qt-devel-docs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:qt-static\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:2.1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:3\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:4\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:4.5\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:5\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2007/04/03\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2007/09/13\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2007/09/14\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2007-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(2\\.1|3|4|5)([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 2.1 / 3.x / 4.x / 5.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2007:0883\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL2.1\", cpu:\"i386\", reference:\"qt-2.3.1-14.EL2\")) flag++;\n\n if (rpm_check(release:\"RHEL2.1\", cpu:\"i386\", reference:\"qt-Xt-2.3.1-14.EL2\")) flag++;\n\n if (rpm_check(release:\"RHEL2.1\", cpu:\"i386\", reference:\"qt-designer-2.3.1-14.EL2\")) flag++;\n\n if (rpm_check(release:\"RHEL2.1\", cpu:\"i386\", reference:\"qt-devel-2.3.1-14.EL2\")) flag++;\n\n if (rpm_check(release:\"RHEL2.1\", cpu:\"i386\", reference:\"qt-static-2.3.1-14.EL2\")) flag++;\n\n\n if (rpm_check(release:\"RHEL3\", reference:\"qt-3.1.2-17.RHEL3\")) flag++;\n\n if (rpm_check(release:\"RHEL3\", reference:\"qt-MySQL-3.1.2-17.RHEL3\")) flag++;\n\n if (rpm_check(release:\"RHEL3\", reference:\"qt-ODBC-3.1.2-17.RHEL3\")) flag++;\n\n if (rpm_check(release:\"RHEL3\", reference:\"qt-config-3.1.2-17.RHEL3\")) flag++;\n\n if (rpm_check(release:\"RHEL3\", reference:\"qt-designer-3.1.2-17.RHEL3\")) flag++;\n\n if (rpm_check(release:\"RHEL3\", reference:\"qt-devel-3.1.2-17.RHEL3\")) flag++;\n\n\n if (rpm_check(release:\"RHEL4\", reference:\"qt-3.3.3-13.RHEL4\")) flag++;\n\n if (rpm_check(release:\"RHEL4\", reference:\"qt-MySQL-3.3.3-13.RHEL4\")) flag++;\n\n if (rpm_check(release:\"RHEL4\", reference:\"qt-ODBC-3.3.3-13.RHEL4\")) flag++;\n\n if (rpm_check(release:\"RHEL4\", reference:\"qt-PostgreSQL-3.3.3-13.RHEL4\")) flag++;\n\n if (rpm_check(release:\"RHEL4\", reference:\"qt-config-3.3.3-13.RHEL4\")) flag++;\n\n if (rpm_check(release:\"RHEL4\", reference:\"qt-designer-3.3.3-13.RHEL4\")) flag++;\n\n if (rpm_check(release:\"RHEL4\", reference:\"qt-devel-3.3.3-13.RHEL4\")) flag++;\n\n\n if (rpm_check(release:\"RHEL5\", reference:\"qt-3.3.6-23.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"qt-MySQL-3.3.6-23.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"qt-MySQL-3.3.6-23.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"qt-MySQL-3.3.6-23.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"qt-ODBC-3.3.6-23.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"qt-ODBC-3.3.6-23.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"qt-ODBC-3.3.6-23.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"qt-PostgreSQL-3.3.6-23.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"qt-PostgreSQL-3.3.6-23.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"qt-PostgreSQL-3.3.6-23.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"qt-config-3.3.6-23.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"qt-config-3.3.6-23.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"qt-config-3.3.6-23.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"qt-designer-3.3.6-23.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"qt-designer-3.3.6-23.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"qt-designer-3.3.6-23.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", reference:\"qt-devel-3.3.6-23.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"i386\", reference:\"qt-devel-docs-3.3.6-23.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"s390x\", reference:\"qt-devel-docs-3.3.6-23.el5\")) flag++;\n\n if (rpm_check(release:\"RHEL5\", cpu:\"x86_64\", reference:\"qt-devel-docs-3.3.6-23.el5\")) flag++;\n\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"qt / qt-MySQL / qt-ODBC / qt-PostgreSQL / qt-Xt / qt-config / etc\");\n }\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T13:12:25", "description": "Several local/remote vulnerabilities have been discovered in the Qt GUI library. The Common Vulnerabilities and Exposures project identifies the following problems :\n\n - CVE-2007-3388 Tim Brown and Dirk Muller discovered several format string vulnerabilities in the handling of error messages, which might lead to the execution of arbitrary code.\n\n - CVE-2007-4137 Dirk Muller discovered an off-by-one buffer overflow in the Unicode handling, which might lead to the execution of arbitrary code.", "cvss3": {"score": null, "vector": null}, "published": "2007-12-11T00:00:00", "type": "nessus", "title": "Debian DSA-1426-1 : qt-x11-free - several vulnerabilities", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2007-3388", "CVE-2007-4137"], "modified": "2021-01-04T00:00:00", "cpe": ["p-cpe:/a:debian:debian_linux:qt-x11-free", "cpe:/o:debian:debian_linux:3.1", "cpe:/o:debian:debian_linux:4.0"], "id": "DEBIAN_DSA-1426.NASL", "href": "https://www.tenable.com/plugins/nessus/29261", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-1426. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(29261);\n script_version(\"1.20\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2007-3388\", \"CVE-2007-4137\");\n script_xref(name:\"DSA\", value:\"1426\");\n\n script_name(english:\"Debian DSA-1426-1 : qt-x11-free - several vulnerabilities\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Several local/remote vulnerabilities have been discovered in the Qt\nGUI library. The Common Vulnerabilities and Exposures project\nidentifies the following problems :\n\n - CVE-2007-3388\n Tim Brown and Dirk Muller discovered several format\n string vulnerabilities in the handling of error\n messages, which might lead to the execution of arbitrary\n code.\n\n - CVE-2007-4137\n Dirk Muller discovered an off-by-one buffer overflow in\n the Unicode handling, which might lead to the execution\n of arbitrary code.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2007-3388\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2007-4137\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.debian.org/security/2007/dsa-1426\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the qt-x11-free packages.\n\nFor the old stable distribution (sarge), these problems have been\nfixed in version 3:3.3.4-3sarge3. Packages for m68k will be provided\nlater.\n\nFor the stable distribution (etch), these problems have been fixed in\nversion 3:3.3.7-4etch1.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_cwe_id(119);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:qt-x11-free\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:3.1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:4.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2007/12/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2007/12/11\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2007-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"3.1\", prefix:\"libqt3-compat-headers\", reference:\"3:3.3.4-3sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"libqt3-dev\", reference:\"3:3.3.4-3sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"libqt3-headers\", reference:\"3:3.3.4-3sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"libqt3-i18n\", reference:\"3:3.3.4-3sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"libqt3-mt-dev\", reference:\"3:3.3.4-3sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"libqt3c102\", reference:\"3:3.3.4-3sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"libqt3c102-ibase\", reference:\"3:3.3.4-3sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"libqt3c102-mt\", reference:\"3:3.3.4-3sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"libqt3c102-mt-ibase\", reference:\"3:3.3.4-3sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"libqt3c102-mt-mysql\", reference:\"3:3.3.4-3sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"libqt3c102-mt-odbc\", reference:\"3:3.3.4-3sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"libqt3c102-mt-psql\", reference:\"3:3.3.4-3sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"libqt3c102-mt-sqlite\", reference:\"3:3.3.4-3sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"libqt3c102-mysql\", reference:\"3:3.3.4-3sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"libqt3c102-odbc\", reference:\"3:3.3.4-3sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"libqt3c102-psql\", reference:\"3:3.3.4-3sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"libqt3c102-sqlite\", reference:\"3:3.3.4-3sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"qt3-apps-dev\", reference:\"3:3.3.4-3sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"qt3-assistant\", reference:\"3:3.3.4-3sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"qt3-designer\", reference:\"3:3.3.4-3sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"qt3-dev-tools\", reference:\"3:3.3.4-3sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"qt3-dev-tools-compat\", reference:\"3:3.3.4-3sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"qt3-dev-tools-embedded\", reference:\"3:3.3.4-3sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"qt3-doc\", reference:\"3:3.3.4-3sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"qt3-examples\", reference:\"3:3.3.4-3sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"qt3-linguist\", reference:\"3:3.3.4-3sarge3\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"qt3-qtconfig\", reference:\"3:3.3.4-3sarge3\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"libqt3-compat-headers\", reference:\"3:3.3.7-4etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"libqt3-headers\", reference:\"3:3.3.7-4etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"libqt3-i18n\", reference:\"3:3.3.7-4etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"libqt3-mt\", reference:\"3:3.3.7-4etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"libqt3-mt-dev\", reference:\"3:3.3.7-4etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"libqt3-mt-ibase\", reference:\"3:3.3.7-4etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"libqt3-mt-mysql\", reference:\"3:3.3.7-4etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"libqt3-mt-odbc\", reference:\"3:3.3.7-4etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"libqt3-mt-psql\", reference:\"3:3.3.7-4etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"libqt3-mt-sqlite\", reference:\"3:3.3.7-4etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"qt-x11-free-dbg\", reference:\"3:3.3.7-4etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"qt3-apps-dev\", reference:\"3:3.3.7-4etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"qt3-assistant\", reference:\"3:3.3.7-4etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"qt3-designer\", reference:\"3:3.3.7-4etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"qt3-dev-tools\", reference:\"3:3.3.7-4etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"qt3-dev-tools-compat\", reference:\"3:3.3.7-4etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"qt3-dev-tools-embedded\", reference:\"3:3.3.7-4etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"qt3-doc\", reference:\"3:3.3.7-4etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"qt3-examples\", reference:\"3:3.3.7-4etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"qt3-linguist\", reference:\"3:3.3.7-4etch1\")) flag++;\nif (deb_check(release:\"4.0\", prefix:\"qt3-qtconfig\", reference:\"3:3.3.7-4etch1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T12:53:50", "description": "From Red Hat Security Advisory 2007:0883 :\n\nUpdated qt packages that correct two security flaws are now available.\n\nThis update has been rated as having important security impact by the Red Hat Security Response Team.\n\nQt is a software toolkit that simplifies the task of writing and maintaining GUI (Graphical User Interface) applications for the X Window System.\n\nA flaw was found in the way Qt expanded certain UTF8 characters. It was possible to prevent a Qt-based application from properly sanitizing user-supplied input. This could, for example, result in a cross-site scripting attack against the Konqueror web browser.\n(CVE-2007-0242)\n\nA buffer overflow flaw was found in the way Qt expanded malformed Unicode strings. If an application linked against Qt parsed a malicious Unicode string, it could lead to a denial of service or possibly allow the execution of arbitrary code. (CVE-2007-4137)\n\nUsers of Qt should upgrade to these updated packages, which contain a backported patch to correct these issues.", "cvss3": {"score": null, "vector": null}, "published": "2013-07-12T00:00:00", "type": "nessus", "title": "Oracle Linux 3 / 4 / 5 : qt (ELSA-2007-0883)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2007-0242", "CVE-2007-4137"], "modified": "2021-01-14T00:00:00", "cpe": ["p-cpe:/a:oracle:linux:qt", "p-cpe:/a:oracle:linux:qt-MySQL", "p-cpe:/a:oracle:linux:qt-ODBC", "p-cpe:/a:oracle:linux:qt-PostgreSQL", "p-cpe:/a:oracle:linux:qt-config", "p-cpe:/a:oracle:linux:qt-designer", "p-cpe:/a:oracle:linux:qt-devel", "p-cpe:/a:oracle:linux:qt-devel-docs", "cpe:/o:oracle:linux:3", "cpe:/o:oracle:linux:4", "cpe:/o:oracle:linux:5"], "id": "ORACLELINUX_ELSA-2007-0883.NASL", "href": "https://www.tenable.com/plugins/nessus/67568", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2007:0883 and \n# Oracle Linux Security Advisory ELSA-2007-0883 respectively.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(67568);\n script_version(\"1.12\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2007-0242\", \"CVE-2007-4137\");\n script_bugtraq_id(23269, 25657);\n script_xref(name:\"RHSA\", value:\"2007:0883\");\n\n script_name(english:\"Oracle Linux 3 / 4 / 5 : qt (ELSA-2007-0883)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Oracle Linux host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"From Red Hat Security Advisory 2007:0883 :\n\nUpdated qt packages that correct two security flaws are now available.\n\nThis update has been rated as having important security impact by the\nRed Hat Security Response Team.\n\nQt is a software toolkit that simplifies the task of writing and\nmaintaining GUI (Graphical User Interface) applications for the X\nWindow System.\n\nA flaw was found in the way Qt expanded certain UTF8 characters. It\nwas possible to prevent a Qt-based application from properly\nsanitizing user-supplied input. This could, for example, result in a\ncross-site scripting attack against the Konqueror web browser.\n(CVE-2007-0242)\n\nA buffer overflow flaw was found in the way Qt expanded malformed\nUnicode strings. If an application linked against Qt parsed a\nmalicious Unicode string, it could lead to a denial of service or\npossibly allow the execution of arbitrary code. (CVE-2007-4137)\n\nUsers of Qt should upgrade to these updated packages, which contain a\nbackported patch to correct these issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2007-September/000322.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2007-September/000323.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2007-September/000324.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected qt packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(119);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:qt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:qt-MySQL\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:qt-ODBC\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:qt-PostgreSQL\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:qt-config\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:qt-designer\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:qt-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:qt-devel-docs\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:3\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:4\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:5\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2007/04/03\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2007/09/13\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2013/07/12\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2013-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/OracleLinux\")) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nos_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Oracle Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(3|4|5)([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Oracle Linux 3 / 4 / 5\", \"Oracle Linux \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && \"ia64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Oracle Linux\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"EL3\", cpu:\"i386\", reference:\"qt-3.1.2-17.RHEL3\")) flag++;\nif (rpm_check(release:\"EL3\", cpu:\"x86_64\", reference:\"qt-3.1.2-17.RHEL3\")) flag++;\nif (rpm_check(release:\"EL3\", cpu:\"i386\", reference:\"qt-MySQL-3.1.2-17.RHEL3\")) flag++;\nif (rpm_check(release:\"EL3\", cpu:\"x86_64\", reference:\"qt-MySQL-3.1.2-17.RHEL3\")) flag++;\nif (rpm_check(release:\"EL3\", cpu:\"i386\", reference:\"qt-ODBC-3.1.2-17.RHEL3\")) flag++;\nif (rpm_check(release:\"EL3\", cpu:\"x86_64\", reference:\"qt-ODBC-3.1.2-17.RHEL3\")) flag++;\nif (rpm_check(release:\"EL3\", cpu:\"i386\", reference:\"qt-config-3.1.2-17.RHEL3\")) flag++;\nif (rpm_check(release:\"EL3\", cpu:\"x86_64\", reference:\"qt-config-3.1.2-17.RHEL3\")) flag++;\nif (rpm_check(release:\"EL3\", cpu:\"i386\", reference:\"qt-designer-3.1.2-17.RHEL3\")) flag++;\nif (rpm_check(release:\"EL3\", cpu:\"x86_64\", reference:\"qt-designer-3.1.2-17.RHEL3\")) flag++;\nif (rpm_check(release:\"EL3\", cpu:\"i386\", reference:\"qt-devel-3.1.2-17.RHEL3\")) flag++;\nif (rpm_check(release:\"EL3\", cpu:\"x86_64\", reference:\"qt-devel-3.1.2-17.RHEL3\")) flag++;\n\nif (rpm_check(release:\"EL4\", cpu:\"i386\", reference:\"qt-3.3.3-13.RHEL4\")) flag++;\nif (rpm_check(release:\"EL4\", cpu:\"x86_64\", reference:\"qt-3.3.3-13.RHEL4\")) flag++;\nif (rpm_check(release:\"EL4\", cpu:\"i386\", reference:\"qt-MySQL-3.3.3-13.RHEL4\")) flag++;\nif (rpm_check(release:\"EL4\", cpu:\"x86_64\", reference:\"qt-MySQL-3.3.3-13.RHEL4\")) flag++;\nif (rpm_check(release:\"EL4\", cpu:\"i386\", reference:\"qt-ODBC-3.3.3-13.RHEL4\")) flag++;\nif (rpm_check(release:\"EL4\", cpu:\"x86_64\", reference:\"qt-ODBC-3.3.3-13.RHEL4\")) flag++;\nif (rpm_check(release:\"EL4\", cpu:\"i386\", reference:\"qt-PostgreSQL-3.3.3-13.RHEL4\")) flag++;\nif (rpm_check(release:\"EL4\", cpu:\"x86_64\", reference:\"qt-PostgreSQL-3.3.3-13.RHEL4\")) flag++;\nif (rpm_check(release:\"EL4\", cpu:\"i386\", reference:\"qt-config-3.3.3-13.RHEL4\")) flag++;\nif (rpm_check(release:\"EL4\", cpu:\"x86_64\", reference:\"qt-config-3.3.3-13.RHEL4\")) flag++;\nif (rpm_check(release:\"EL4\", cpu:\"i386\", reference:\"qt-designer-3.3.3-13.RHEL4\")) flag++;\nif (rpm_check(release:\"EL4\", cpu:\"x86_64\", reference:\"qt-designer-3.3.3-13.RHEL4\")) flag++;\nif (rpm_check(release:\"EL4\", cpu:\"i386\", reference:\"qt-devel-3.3.3-13.RHEL4\")) flag++;\nif (rpm_check(release:\"EL4\", cpu:\"x86_64\", reference:\"qt-devel-3.3.3-13.RHEL4\")) flag++;\n\nif (rpm_check(release:\"EL5\", reference:\"qt-3.3.6-23.el5\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"qt-MySQL-3.3.6-23.el5\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"qt-ODBC-3.3.6-23.el5\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"qt-PostgreSQL-3.3.6-23.el5\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"qt-config-3.3.6-23.el5\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"qt-designer-3.3.6-23.el5\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"qt-devel-3.3.6-23.el5\")) flag++;\nif (rpm_check(release:\"EL5\", reference:\"qt-devel-docs-3.3.6-23.el5\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"qt / qt-MySQL / qt-ODBC / qt-PostgreSQL / qt-config / qt-designer / etc\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T13:12:47", "description": "- Mon Sep 17 2007 Than Ngo <than at redhat.com> - 1:3.3.8-7\n\n - bz292941, CVE-2007-4137\n\n - Wed Aug 29 2007 Than Ngo <than at redhat.com> - 1:3.3.8-6.fc7.1\n\n - cleanup security patch\n\n - Tue Aug 28 2007 Than Ngo <than at redhat.com> - 1:3.3.8-6.fc7\n\n - CVE-2007-3388 qt3 format string flaw\n\n - Thu Jun 14 2007 Than Ngo <than at redhat.com> - 1:3.3.8-5.fc7.1\n\n - backport to fix #bz243722, bz#244148, Applications using qt-mysql crash if database is removed before QApplication is destroyed\n\n - Mon Apr 23 2007 Than Ngo <than at redhat.com> - 1:3.3.8-5.fc7\n\n - apply patch to fix fontrendering problem in gu_IN #228451,#228452\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": null, "vector": null}, "published": "2007-11-06T00:00:00", "type": "nessus", "title": "Fedora 7 : qt-3.3.8-7.fc7 (2007-2216)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2007-3388", "CVE-2007-4137"], "modified": "2021-01-11T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:qt", "p-cpe:/a:fedoraproject:fedora:qt-MySQL", "p-cpe:/a:fedoraproject:fedora:qt-ODBC", "p-cpe:/a:fedoraproject:fedora:qt-PostgreSQL", "p-cpe:/a:fedoraproject:fedora:qt-config", "p-cpe:/a:fedoraproject:fedora:qt-debuginfo", "p-cpe:/a:fedoraproject:fedora:qt-designer", "p-cpe:/a:fedoraproject:fedora:qt-devel", "p-cpe:/a:fedoraproject:fedora:qt-devel-docs", "p-cpe:/a:fedoraproject:fedora:qt-sqlite", "cpe:/o:fedoraproject:fedora:7"], "id": "FEDORA_2007-2216.NASL", "href": "https://www.tenable.com/plugins/nessus/27760", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2007-2216.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(27760);\n script_version(\"1.18\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2007-3388\", \"CVE-2007-4137\");\n script_bugtraq_id(23269, 25154);\n script_xref(name:\"FEDORA\", value:\"2007-2216\");\n\n script_name(english:\"Fedora 7 : qt-3.3.8-7.fc7 (2007-2216)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\" - Mon Sep 17 2007 Than Ngo <than at redhat.com> -\n 1:3.3.8-7\n\n - bz292941, CVE-2007-4137\n\n - Wed Aug 29 2007 Than Ngo <than at redhat.com> -\n 1:3.3.8-6.fc7.1\n\n - cleanup security patch\n\n - Tue Aug 28 2007 Than Ngo <than at redhat.com> -\n 1:3.3.8-6.fc7\n\n - CVE-2007-3388 qt3 format string flaw\n\n - Thu Jun 14 2007 Than Ngo <than at redhat.com> -\n 1:3.3.8-5.fc7.1\n\n - backport to fix #bz243722, bz#244148, Applications\n using qt-mysql crash if database is removed before\n QApplication is destroyed\n\n - Mon Apr 23 2007 Than Ngo <than at redhat.com> -\n 1:3.3.8-5.fc7\n\n - apply patch to fix fontrendering problem in gu_IN\n #228451,#228452\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.redhat.com/show_bug.cgi?id=292941\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2007-September/003847.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?c9553a56\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(119);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:qt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:qt-MySQL\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:qt-ODBC\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:qt-PostgreSQL\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:qt-config\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:qt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:qt-designer\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:qt-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:qt-devel-docs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:qt-sqlite\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:7\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2007/09/18\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2007/11/06\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2007-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^7([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 7.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC7\", reference:\"qt-3.3.8-7.fc7\")) flag++;\nif (rpm_check(release:\"FC7\", reference:\"qt-MySQL-3.3.8-7.fc7\")) flag++;\nif (rpm_check(release:\"FC7\", reference:\"qt-ODBC-3.3.8-7.fc7\")) flag++;\nif (rpm_check(release:\"FC7\", reference:\"qt-PostgreSQL-3.3.8-7.fc7\")) flag++;\nif (rpm_check(release:\"FC7\", reference:\"qt-config-3.3.8-7.fc7\")) flag++;\nif (rpm_check(release:\"FC7\", reference:\"qt-debuginfo-3.3.8-7.fc7\")) flag++;\nif (rpm_check(release:\"FC7\", reference:\"qt-designer-3.3.8-7.fc7\")) flag++;\nif (rpm_check(release:\"FC7\", reference:\"qt-devel-3.3.8-7.fc7\")) flag++;\nif (rpm_check(release:\"FC7\", reference:\"qt-devel-docs-3.3.8-7.fc7\")) flag++;\nif (rpm_check(release:\"FC7\", reference:\"qt-sqlite-3.3.8-7.fc7\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"qt / qt-MySQL / qt-ODBC / qt-PostgreSQL / qt-config / qt-debuginfo / etc\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T12:57:28", "description": "A flaw was found in the way Qt expanded certain UTF8 characters. It was possible to prevent a Qt-based application from properly sanitizing user supplied input. This could, for example, result in a cross-site scripting attack against the Konqueror web browser.\n(CVE-2007-0242)\n\nA buffer overflow flaw was found in the way Qt expanded malformed Unicode strings. If an application linked against Qt parsed a malicious Unicode string, it could lead to a denial of service or possibly allow the execution of arbitrary code. (CVE-2007-4137)", "cvss3": {"score": null, "vector": null}, "published": "2012-08-01T00:00:00", "type": "nessus", "title": "Scientific Linux Security Update : qt on SL5.x, SL4.x, SL3.x i386/x86_64", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2007-0242", "CVE-2007-4137"], "modified": "2021-01-14T00:00:00", "cpe": ["x-cpe:/o:fermilab:scientific_linux"], "id": "SL_20070913_QT_ON_SL5_X.NASL", "href": "https://www.tenable.com/plugins/nessus/60250", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text is (C) Scientific Linux.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(60250);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2007-0242\", \"CVE-2007-4137\");\n\n script_name(english:\"Scientific Linux Security Update : qt on SL5.x, SL4.x, SL3.x i386/x86_64\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Scientific Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"A flaw was found in the way Qt expanded certain UTF8 characters. It\nwas possible to prevent a Qt-based application from properly\nsanitizing user supplied input. This could, for example, result in a\ncross-site scripting attack against the Konqueror web browser.\n(CVE-2007-0242)\n\nA buffer overflow flaw was found in the way Qt expanded malformed\nUnicode strings. If an application linked against Qt parsed a\nmalicious Unicode string, it could lead to a denial of service or\npossibly allow the execution of arbitrary code. (CVE-2007-4137)\"\n );\n # https://listserv.fnal.gov/scripts/wa.exe?A2=ind0709&L=scientific-linux-errata&T=0&P=784\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?5a3ec66f\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_cwe_id(119);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"x-cpe:/o:fermilab:scientific_linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2007/09/13\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/08/01\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Scientific Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Scientific Linux \" >!< release) audit(AUDIT_HOST_NOT, \"running Scientific Linux\");\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Scientific Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"SL3\", reference:\"qt-3.1.2-17.RHEL3\")) flag++;\nif (rpm_check(release:\"SL3\", reference:\"qt-MySQL-3.1.2-17.RHEL3\")) flag++;\nif (rpm_check(release:\"SL3\", reference:\"qt-ODBC-3.1.2-17.RHEL3\")) flag++;\nif (rpm_check(release:\"SL3\", reference:\"qt-PostgreSQL-3.1.2-17.RHEL3\")) flag++;\nif (rpm_check(release:\"SL3\", reference:\"qt-config-3.1.2-17.RHEL3\")) flag++;\nif (rpm_check(release:\"SL3\", reference:\"qt-designer-3.1.2-17.RHEL3\")) flag++;\nif (rpm_check(release:\"SL3\", reference:\"qt-devel-3.1.2-17.RHEL3\")) flag++;\n\nif (rpm_check(release:\"SL4\", reference:\"qt-3.3.3-13.RHEL4\")) flag++;\nif (rpm_check(release:\"SL4\", reference:\"qt-MySQL-3.3.3-13.RHEL4\")) flag++;\nif (rpm_check(release:\"SL4\", reference:\"qt-ODBC-3.3.3-13.RHEL4\")) flag++;\nif (rpm_check(release:\"SL4\", reference:\"qt-PostgreSQL-3.3.3-13.RHEL4\")) flag++;\nif (rpm_check(release:\"SL4\", reference:\"qt-config-3.3.3-13.RHEL4\")) flag++;\nif (rpm_check(release:\"SL4\", reference:\"qt-designer-3.3.3-13.RHEL4\")) flag++;\nif (rpm_check(release:\"SL4\", reference:\"qt-devel-3.3.3-13.RHEL4\")) flag++;\n\nif (rpm_check(release:\"SL5\", reference:\"qt-3.3.6-23.el5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"qt-MySQL-3.3.6-23.el5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"qt-ODBC-3.3.6-23.el5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"qt-PostgreSQL-3.3.6-23.el5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"qt-config-3.3.6-23.el5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"qt-designer-3.3.6-23.el5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"qt-devel-3.3.6-23.el5\")) flag++;\nif (rpm_check(release:\"SL5\", reference:\"qt-devel-docs-3.3.6-23.el5\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-08-19T13:13:03", "description": "- Mon Sep 17 2007 Than Ngo <than at redhat.com> - 1:3.3.8-2.fc6\n\n - bz292951, CVE-2007-4137\n\n - Wed Aug 29 2007 Than Ngo <than at redhat.com> - 1:3.3.8-1.fc6.1\n\n - CVE-2007-3388 qt format string flaw\n\n - bz#234635, CVE-2007-0242 qt UTF8 improper character expansion\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": null, "vector": null}, "published": "2007-09-24T00:00:00", "type": "nessus", "title": "Fedora Core 6 : qt-3.3.8-2.fc6 (2007-703)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2007-0242", "CVE-2007-3388", "CVE-2007-4137"], "modified": "2021-01-11T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:qt", "p-cpe:/a:fedoraproject:fedora:qt-MySQL", "p-cpe:/a:fedoraproject:fedora:qt-ODBC", "p-cpe:/a:fedoraproject:fedora:qt-PostgreSQL", "p-cpe:/a:fedoraproject:fedora:qt-config", "p-cpe:/a:fedoraproject:fedora:qt-debuginfo", "p-cpe:/a:fedoraproject:fedora:qt-designer", "p-cpe:/a:fedoraproject:fedora:qt-devel", "p-cpe:/a:fedoraproject:fedora:qt-devel-docs", "cpe:/o:fedoraproject:fedora_core:6"], "id": "FEDORA_2007-703.NASL", "href": "https://www.tenable.com/plugins/nessus/26083", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory 2007-703.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(26083);\n script_version(\"1.15\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2007-0242\", \"CVE-2007-3388\", \"CVE-2007-4137\");\n script_xref(name:\"FEDORA\", value:\"2007-703\");\n\n script_name(english:\"Fedora Core 6 : qt-3.3.8-2.fc6 (2007-703)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora Core host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\" - Mon Sep 17 2007 Than Ngo <than at redhat.com> -\n 1:3.3.8-2.fc6\n\n - bz292951, CVE-2007-4137\n\n - Wed Aug 29 2007 Than Ngo <than at redhat.com> -\n 1:3.3.8-1.fc6.1\n\n - CVE-2007-3388 qt format string flaw\n\n - bz#234635, CVE-2007-0242 qt UTF8 improper character\n expansion\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n # https://lists.fedoraproject.org/pipermail/package-announce/2007-September/003835.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?0f1a8aa8\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_cwe_id(119);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:qt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:qt-MySQL\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:qt-ODBC\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:qt-PostgreSQL\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:qt-config\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:qt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:qt-designer\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:qt-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:qt-devel-docs\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora_core:6\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2007/09/18\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2007/09/24\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2007-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = eregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 6.x\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"FC6\", reference:\"qt-3.3.8-2.fc6\")) flag++;\nif (rpm_check(release:\"FC6\", reference:\"qt-MySQL-3.3.8-2.fc6\")) flag++;\nif (rpm_check(release:\"FC6\", reference:\"qt-ODBC-3.3.8-2.fc6\")) flag++;\nif (rpm_check(release:\"FC6\", reference:\"qt-PostgreSQL-3.3.8-2.fc6\")) flag++;\nif (rpm_check(release:\"FC6\", reference:\"qt-config-3.3.8-2.fc6\")) flag++;\nif (rpm_check(release:\"FC6\", reference:\"qt-debuginfo-3.3.8-2.fc6\")) flag++;\nif (rpm_check(release:\"FC6\", reference:\"qt-designer-3.3.8-2.fc6\")) flag++;\nif (rpm_check(release:\"FC6\", reference:\"qt-devel-3.3.8-2.fc6\")) flag++;\nif (rpm_check(release:\"FC6\", reference:\"qt-devel-docs-3.3.8-2.fc6\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"qt / qt-MySQL / qt-ODBC / qt-PostgreSQL / qt-config / qt-debuginfo / etc\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "gentoo": [{"lastseen": "2022-01-17T19:16:12", "description": "### Background\n\nQt is a cross-platform GUI framework, which is used e.g. by KDE. \n\n### Description\n\nDirk Mueller from the KDE development team discovered a boundary error in file qutfcodec.cpp when processing Unicode strings. \n\n### Impact\n\nA remote attacker could send a specially crafted Unicode string to a vulnerable Qt application, possibly resulting in the remote execution of arbitrary code with the privileges of the user running the application. Note that the boundary error is present but reported to be not exploitable in 4.x series. \n\n### Workaround\n\nThere is no known workaround at this time. \n\n### Resolution\n\nAll Qt 3.x users should upgrade to the latest version: \n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=x11-libs/qt-3.3.8-r4\"", "cvss3": {}, "published": "2007-10-25T00:00:00", "type": "gentoo", "title": "Qt: Buffer overflow", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": true, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2007-4137"], "modified": "2007-10-25T00:00:00", "id": "GLSA-200710-28", "href": "https://security.gentoo.org/glsa/200710-28", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "openvas": [{"lastseen": "2017-07-24T12:50:05", "description": "The remote host is missing updates announced in\nadvisory GLSA 200710-28.", "cvss3": {}, "published": "2008-09-24T00:00:00", "type": "openvas", "title": "Gentoo Security Advisory GLSA 200710-28 (qt)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2007-4137"], "modified": "2017-07-07T00:00:00", "id": "OPENVAS:58707", "href": "http://plugins.openvas.org/nasl.php?oid=58707", "sourceData": "# OpenVAS Vulnerability Test\n# $\n# Description: Auto generated from Gentoo's XML based advisory\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"An off-by-one vulnerability has been discovered in Qt, possibly resulting\nin the execution of arbitrary code.\";\ntag_solution = \"All Qt 3.x users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=x11-libs/qt-3.3.8-r4'\n\nhttp://www.securityspace.com/smysecure/catid.html?in=GLSA%20200710-28\nhttp://bugs.gentoo.org/show_bug.cgi?id=192472\";\ntag_summary = \"The remote host is missing updates announced in\nadvisory GLSA 200710-28.\";\n\n \n\nif(description)\n{\n script_id(58707);\n script_version(\"$Revision: 6596 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 11:21:37 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)\");\n script_cve_id(\"CVE-2007-4137\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_name(\"Gentoo Security Advisory GLSA 200710-28 (qt)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Gentoo Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/gentoo\", \"ssh/login/pkg\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-gentoo.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = ispkgvuln(pkg:\"x11-libs/qt\", unaffected: make_list(\"ge 3.3.8-r4\"), vulnerable: make_list(\"lt 3.3.8-r4\"))) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-12-04T11:28:03", "description": "Ubuntu Update for Linux kernel vulnerabilities USN-513-1", "cvss3": {}, "published": "2009-03-23T00:00:00", "type": "openvas", "title": "Ubuntu Update for qt-x11-free vulnerability USN-513-1", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2007-4137"], "modified": "2017-12-01T00:00:00", "id": "OPENVAS:840145", "href": "http://plugins.openvas.org/nasl.php?oid=840145", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_513_1.nasl 7969 2017-12-01 09:23:16Z santu $\n#\n# Ubuntu Update for qt-x11-free vulnerability USN-513-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Dirk Mueller discovered that UTF8 strings could be made to cause a small\n buffer overflow. A remote attacker could exploit this by sending specially\n crafted strings to applications that use the Qt3 library for UTF8 processing,\n potentially leading to arbitrary code execution with user privileges, or a\n denial of service.\";\n\ntag_summary = \"Ubuntu Update for Linux kernel vulnerabilities USN-513-1\";\ntag_affected = \"qt-x11-free vulnerability on Ubuntu 6.06 LTS ,\n Ubuntu 6.10 ,\n Ubuntu 7.04\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name: \"URL\" , value: \"http://www.ubuntu.com/usn/usn-513-1/\");\n script_id(840145);\n script_version(\"$Revision: 7969 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-01 10:23:16 +0100 (Fri, 01 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-03-23 10:59:50 +0100 (Mon, 23 Mar 2009)\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"USN\", value: \"513-1\");\n script_cve_id(\"CVE-2007-4137\");\n script_name( \"Ubuntu Update for qt-x11-free vulnerability USN-513-1\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\");\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"UBUNTU7.04\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libqt3-compat-headers\", ver:\"3.3.8really3.3.7-0ubuntu5.2\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libqt3-headers\", ver:\"3.3.8really3.3.7-0ubuntu5.2\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libqt3-mt-dev\", ver:\"3.3.8really3.3.7-0ubuntu5.2\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libqt3-mt\", ver:\"3.3.8really3.3.7-0ubuntu5.2\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"qt-x11-free-dbg\", ver:\"3.3.8really3.3.7-0ubuntu5.2\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"qt3-apps-dev\", ver:\"3.3.8really3.3.7-0ubuntu5.2\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"qt3-assistant\", ver:\"3.3.8really3.3.7-0ubuntu5.2\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"qt3-designer\", ver:\"3.3.8really3.3.7-0ubuntu5.2\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"qt3-dev-tools\", ver:\"3.3.8really3.3.7-0ubuntu5.2\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libqt3-mt-mysql\", ver:\"3.3.8really3.3.7-0ubuntu5.2\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libqt3-mt-odbc\", ver:\"3.3.8really3.3.7-0ubuntu5.2\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libqt3-mt-psql\", ver:\"3.3.8really3.3.7-0ubuntu5.2\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libqt3-mt-sqlite\", ver:\"3.3.8really3.3.7-0ubuntu5.2\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"qt3-dev-tools-compat\", ver:\"3.3.8really3.3.7-0ubuntu5.2\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"qt3-dev-tools-embedded\", ver:\"3.3.8really3.3.7-0ubuntu5.2\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"qt3-linguist\", ver:\"3.3.8really3.3.7-0ubuntu5.2\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"qt3-qtconfig\", ver:\"3.3.8really3.3.7-0ubuntu5.2\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"qt3-doc\", ver:\"3.3.8really3.3.7-0ubuntu5.2\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libqt3-i18n\", ver:\"3.3.8really3.3.7-0ubuntu5.2\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"qt3-examples\", ver:\"3.3.8really3.3.7-0ubuntu5.2\", rls:\"UBUNTU7.04\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU6.06 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libqt3-compat-headers\", ver:\"3.3.6-1ubuntu6.4\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libqt3-headers\", ver:\"3.3.6-1ubuntu6.4\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libqt3-mt-dev\", ver:\"3.3.6-1ubuntu6.4\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libqt3-mt\", ver:\"3.3.6-1ubuntu6.4\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"qt3-apps-dev\", ver:\"3.3.6-1ubuntu6.4\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"qt3-dev-tools\", ver:\"3.3.6-1ubuntu6.4\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libqt3-mt-mysql\", ver:\"3.3.6-1ubuntu6.4\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libqt3-mt-odbc\", ver:\"3.3.6-1ubuntu6.4\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libqt3-mt-psql\", ver:\"3.3.6-1ubuntu6.4\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libqt3-mt-sqlite\", ver:\"3.3.6-1ubuntu6.4\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"qt-x11-free-dbg\", ver:\"3.3.6-1ubuntu6.4\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"qt3-assistant\", ver:\"3.3.6-1ubuntu6.4\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"qt3-designer\", ver:\"3.3.6-1ubuntu6.4\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"qt3-dev-tools-compat\", ver:\"3.3.6-1ubuntu6.4\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"qt3-dev-tools-embedded\", ver:\"3.3.6-1ubuntu6.4\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"qt3-linguist\", ver:\"3.3.6-1ubuntu6.4\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"qt3-qtconfig\", ver:\"3.3.6-1ubuntu6.4\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"qt3-doc\", ver:\"3.3.6-1ubuntu6.4\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libqt3-i18n\", ver:\"3.3.6-1ubuntu6.4\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"qt3-examples\", ver:\"3.3.6-1ubuntu6.4\", rls:\"UBUNTU6.06 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"UBUNTU6.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"libqt3-compat-headers\", ver:\"3.3.6-3ubuntu3.3\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libqt3-headers\", ver:\"3.3.6-3ubuntu3.3\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libqt3-mt-dev\", ver:\"3.3.6-3ubuntu3.3\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libqt3-mt\", ver:\"3.3.6-3ubuntu3.3\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"qt-x11-free-dbg\", ver:\"3.3.6-3ubuntu3.3\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"qt3-apps-dev\", ver:\"3.3.6-3ubuntu3.3\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"qt3-designer\", ver:\"3.3.6-3ubuntu3.3\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"qt3-dev-tools\", ver:\"3.3.6-3ubuntu3.3\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libqt3-mt-mysql\", ver:\"3.3.6-3ubuntu3.3\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libqt3-mt-odbc\", ver:\"3.3.6-3ubuntu3.3\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libqt3-mt-psql\", ver:\"3.3.6-3ubuntu3.3\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libqt3-mt-sqlite\", ver:\"3.3.6-3ubuntu3.3\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"qt3-assistant\", ver:\"3.3.6-3ubuntu3.3\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"qt3-dev-tools-compat\", ver:\"3.3.6-3ubuntu3.3\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"qt3-dev-tools-embedded\", ver:\"3.3.6-3ubuntu3.3\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"qt3-linguist\", ver:\"3.3.6-3ubuntu3.3\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"qt3-qtconfig\", ver:\"3.3.6-3ubuntu3.3\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"qt3-doc\", ver:\"3.3.6-3ubuntu3.3\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"libqt3-i18n\", ver:\"3.3.6-3ubuntu3.3\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"qt3-examples\", ver:\"3.3.6-3ubuntu3.3\", rls:\"UBUNTU6.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-07-24T12:56:22", "description": "Check for the Version of qt", "cvss3": {}, "published": "2009-04-09T00:00:00", "type": "openvas", "title": "Mandriva Update for qt MDKSA-2007:183 (qt)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2007-4137"], "modified": "2017-07-06T00:00:00", "id": "OPENVAS:830124", "href": "http://plugins.openvas.org/nasl.php?oid=830124", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mandriva Update for qt MDKSA-2007:183 (qt)\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"A buffer overflow was found in how Qt expanded malformed Unicode\n strings. If an application linked against Qt parsed a malicious\n Unicode string, it could lead to a denial of service or potentially\n allow for the execution of arbitrary code.\n\n Updated packages have been patched to prevent this issue. Although the\n problem is not exploitable in Qt4, patched packages have been issued\n regardless.\";\n\ntag_affected = \"qt on Mandriva Linux 2007.0,\n Mandriva Linux 2007.0/X86_64,\n Mandriva Linux 2007.1,\n Mandriva Linux 2007.1/X86_64\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.mandriva.com/security-announce/2007-09/msg00014.php\");\n script_id(830124);\n script_version(\"$Revision: 6568 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-06 15:04:21 +0200 (Thu, 06 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-04-09 13:57:01 +0200 (Thu, 09 Apr 2009)\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"MDKSA\", value: \"2007:183\");\n script_cve_id(\"CVE-2007-4137\");\n script_name( \"Mandriva Update for qt MDKSA-2007:183 (qt)\");\n\n script_summary(\"Check for the Version of qt\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/release\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"MNDK_2007.1\")\n{\n\n if ((res = isrpmvuln(pkg:\"libdesignercore1\", rpm:\"libdesignercore1~3.3.8~4.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libeditor1\", rpm:\"libeditor1~3.3.8~4.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqassistant1\", rpm:\"libqassistant1~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqassistantclient1\", rpm:\"libqassistantclient1~3.3.8~4.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqt3\", rpm:\"libqt3~3.3.8~4.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqt3-devel\", rpm:\"libqt3-devel~3.3.8~4.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqt3-mysql\", rpm:\"libqt3-mysql~3.3.8~4.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqt3-odbc\", rpm:\"libqt3-odbc~3.3.8~4.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqt3-psql\", rpm:\"libqt3-psql~3.3.8~4.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqt3-sqlite\", rpm:\"libqt3-sqlite~3.3.8~4.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqt3-static-devel\", rpm:\"libqt3-static-devel~3.3.8~4.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqt3support4\", rpm:\"libqt3support4~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqt4-devel\", rpm:\"libqt4-devel~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqtcore4\", rpm:\"libqtcore4~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqtdbus4\", rpm:\"libqtdbus4~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqtdesigner1\", rpm:\"libqtdesigner1~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqtgui4\", rpm:\"libqtgui4~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqtnetwork4\", rpm:\"libqtnetwork4~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqtopengl4\", rpm:\"libqtopengl4~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqtsql4\", rpm:\"libqtsql4~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqtsvg4\", rpm:\"libqtsvg4~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqttest4\", rpm:\"libqttest4~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqtuitools4\", rpm:\"libqtuitools4~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqtxml4\", rpm:\"libqtxml4~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt3-common\", rpm:\"qt3-common~3.3.8~4.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt3-doc\", rpm:\"qt3-doc~3.3.8~4.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt3-example\", rpm:\"qt3-example~3.3.8~4.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt3-tutorial\", rpm:\"qt3-tutorial~3.3.8~4.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-accessibility-plugin-lib\", rpm:\"qt4-accessibility-plugin-lib~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-assistant\", rpm:\"qt4-assistant~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-codecs-plugin-lib\", rpm:\"qt4-codecs-plugin-lib~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-common\", rpm:\"qt4-common~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-database-plugin-mysql-lib\", rpm:\"qt4-database-plugin-mysql-lib~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-database-plugin-odbc-lib\", rpm:\"qt4-database-plugin-odbc-lib~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-database-plugin-pgsql-lib\", rpm:\"qt4-database-plugin-pgsql-lib~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-database-plugin-sqlite-lib\", rpm:\"qt4-database-plugin-sqlite-lib~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-designer\", rpm:\"qt4-designer~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-doc\", rpm:\"qt4-doc~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-examples\", rpm:\"qt4-examples~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-linguist\", rpm:\"qt4-linguist~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-qvfb\", rpm:\"qt4-qvfb~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-tutorial\", rpm:\"qt4-tutorial~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt3\", rpm:\"qt3~3.3.8~4.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4\", rpm:\"qt4~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64designercore1\", rpm:\"lib64designercore1~3.3.8~4.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64editor1\", rpm:\"lib64editor1~3.3.8~4.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qassistant1\", rpm:\"lib64qassistant1~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qassistantclient1\", rpm:\"lib64qassistantclient1~3.3.8~4.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qt3\", rpm:\"lib64qt3~3.3.8~4.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qt3-devel\", rpm:\"lib64qt3-devel~3.3.8~4.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qt3-mysql\", rpm:\"lib64qt3-mysql~3.3.8~4.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qt3-odbc\", rpm:\"lib64qt3-odbc~3.3.8~4.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qt3-psql\", rpm:\"lib64qt3-psql~3.3.8~4.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qt3-sqlite\", rpm:\"lib64qt3-sqlite~3.3.8~4.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qt3-static-devel\", rpm:\"lib64qt3-static-devel~3.3.8~4.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qt3support4\", rpm:\"lib64qt3support4~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qt4-devel\", rpm:\"lib64qt4-devel~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qtcore4\", rpm:\"lib64qtcore4~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qtdbus4\", rpm:\"lib64qtdbus4~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qtdesigner1\", rpm:\"lib64qtdesigner1~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qtgui4\", rpm:\"lib64qtgui4~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qtnetwork4\", rpm:\"lib64qtnetwork4~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qtopengl4\", rpm:\"lib64qtopengl4~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qtsql4\", rpm:\"lib64qtsql4~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qtsvg4\", rpm:\"lib64qtsvg4~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qttest4\", rpm:\"lib64qttest4~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qtuitools4\", rpm:\"lib64qtuitools4~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qtxml4\", rpm:\"lib64qtxml4~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-accessibility-plugin-lib64\", rpm:\"qt4-accessibility-plugin-lib64~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-codecs-plugin-lib64\", rpm:\"qt4-codecs-plugin-lib64~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-database-plugin-mysql-lib64\", rpm:\"qt4-database-plugin-mysql-lib64~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-database-plugin-odbc-lib64\", rpm:\"qt4-database-plugin-odbc-lib64~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-database-plugin-pgsql-lib64\", rpm:\"qt4-database-plugin-pgsql-lib64~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-database-plugin-sqlite-lib64\", rpm:\"qt4-database-plugin-sqlite-lib64~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"MNDK_2007.0\")\n{\n\n if ((res = isrpmvuln(pkg:\"libdesignercore1\", rpm:\"libdesignercore1~3.3.6~18.4mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libeditor1\", rpm:\"libeditor1~3.3.6~18.4mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqassistant1\", rpm:\"libqassistant1~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqassistantclient1\", rpm:\"libqassistantclient1~3.3.6~18.4mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqt3\", rpm:\"libqt3~3.3.6~18.4mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqt3-devel\", rpm:\"libqt3-devel~3.3.6~18.4mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqt3-mysql\", rpm:\"libqt3-mysql~3.3.6~18.4mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqt3-odbc\", rpm:\"libqt3-odbc~3.3.6~18.4mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqt3-psql\", rpm:\"libqt3-psql~3.3.6~18.4mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqt3-sqlite\", rpm:\"libqt3-sqlite~3.3.6~18.4mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqt3-static-devel\", rpm:\"libqt3-static-devel~3.3.6~18.4mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqt3support4\", rpm:\"libqt3support4~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqt4-devel\", rpm:\"libqt4-devel~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqtcore4\", rpm:\"libqtcore4~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqtdesigner1\", rpm:\"libqtdesigner1~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqtgui4\", rpm:\"libqtgui4~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqtnetwork4\", rpm:\"libqtnetwork4~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqtopengl4\", rpm:\"libqtopengl4~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqtsql4\", rpm:\"libqtsql4~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqtsvg4\", rpm:\"libqtsvg4~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqttest4\", rpm:\"libqttest4~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqtuitools4\", rpm:\"libqtuitools4~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqtxml4\", rpm:\"libqtxml4~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt3-common\", rpm:\"qt3-common~3.3.6~18.4mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt3-doc\", rpm:\"qt3-doc~3.3.6~18.4mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt3-example\", rpm:\"qt3-example~3.3.6~18.4mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt3-tutorial\", rpm:\"qt3-tutorial~3.3.6~18.4mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-accessibility-plugin-lib\", rpm:\"qt4-accessibility-plugin-lib~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-assistant\", rpm:\"qt4-assistant~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-common\", rpm:\"qt4-common~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-database-plugin-mysql-lib\", rpm:\"qt4-database-plugin-mysql-lib~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-database-plugin-odbc-lib\", rpm:\"qt4-database-plugin-odbc-lib~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-database-plugin-pgsql-lib\", rpm:\"qt4-database-plugin-pgsql-lib~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-database-plugin-sqlite-lib\", rpm:\"qt4-database-plugin-sqlite-lib~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-designer\", rpm:\"qt4-designer~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-doc\", rpm:\"qt4-doc~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-examples\", rpm:\"qt4-examples~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-linguist\", rpm:\"qt4-linguist~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-tutorial\", rpm:\"qt4-tutorial~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt3\", rpm:\"qt3~3.3.6~18.4mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4\", rpm:\"qt4~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64designercore1\", rpm:\"lib64designercore1~3.3.6~18.4mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64editor1\", rpm:\"lib64editor1~3.3.6~18.4mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qassistant1\", rpm:\"lib64qassistant1~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qassistantclient1\", rpm:\"lib64qassistantclient1~3.3.6~18.4mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qt3\", rpm:\"lib64qt3~3.3.6~18.4mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qt3-devel\", rpm:\"lib64qt3-devel~3.3.6~18.4mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qt3-mysql\", rpm:\"lib64qt3-mysql~3.3.6~18.4mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qt3-odbc\", rpm:\"lib64qt3-odbc~3.3.6~18.4mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qt3-psql\", rpm:\"lib64qt3-psql~3.3.6~18.4mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qt3-sqlite\", rpm:\"lib64qt3-sqlite~3.3.6~18.4mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qt3-static-devel\", rpm:\"lib64qt3-static-devel~3.3.6~18.4mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qt3support4\", rpm:\"lib64qt3support4~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qt4-devel\", rpm:\"lib64qt4-devel~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qtcore4\", rpm:\"lib64qtcore4~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qtdesigner1\", rpm:\"lib64qtdesigner1~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qtgui4\", rpm:\"lib64qtgui4~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qtnetwork4\", rpm:\"lib64qtnetwork4~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qtopengl4\", rpm:\"lib64qtopengl4~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qtsql4\", rpm:\"lib64qtsql4~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qtsvg4\", rpm:\"lib64qtsvg4~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qttest4\", rpm:\"lib64qttest4~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qtuitools4\", rpm:\"lib64qtuitools4~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qtxml4\", rpm:\"lib64qtxml4~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-accessibility-plugin-lib64\", rpm:\"qt4-accessibility-plugin-lib64~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-database-plugin-mysql-lib64\", rpm:\"qt4-database-plugin-mysql-lib64~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-database-plugin-odbc-lib64\", rpm:\"qt4-database-plugin-odbc-lib64~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-database-plugin-pgsql-lib64\", rpm:\"qt4-database-plugin-pgsql-lib64~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-database-plugin-sqlite-lib64\", rpm:\"qt4-database-plugin-sqlite-lib64~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-04-09T11:39:26", "description": "Check for the Version of qt", "cvss3": {}, "published": "2009-04-09T00:00:00", "type": "openvas", "title": "Mandriva Update for qt MDKSA-2007:183 (qt)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2007-4137"], "modified": "2018-04-06T00:00:00", "id": "OPENVAS:1361412562310830124", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310830124", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Mandriva Update for qt MDKSA-2007:183 (qt)\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"A buffer overflow was found in how Qt expanded malformed Unicode\n strings. If an application linked against Qt parsed a malicious\n Unicode string, it could lead to a denial of service or potentially\n allow for the execution of arbitrary code.\n\n Updated packages have been patched to prevent this issue. Although the\n problem is not exploitable in Qt4, patched packages have been issued\n regardless.\";\n\ntag_affected = \"qt on Mandriva Linux 2007.0,\n Mandriva Linux 2007.0/X86_64,\n Mandriva Linux 2007.1,\n Mandriva Linux 2007.1/X86_64\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"http://lists.mandriva.com/security-announce/2007-09/msg00014.php\");\n script_oid(\"1.3.6.1.4.1.25623.1.0.830124\");\n script_version(\"$Revision: 9370 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 10:53:14 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-04-09 13:57:01 +0200 (Thu, 09 Apr 2009)\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"MDKSA\", value: \"2007:183\");\n script_cve_id(\"CVE-2007-4137\");\n script_name( \"Mandriva Update for qt MDKSA-2007:183 (qt)\");\n\n script_tag(name:\"summary\", value:\"Check for the Version of qt\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Mandrake Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mandriva_mandrake_linux\", \"ssh/login/release\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"MNDK_2007.1\")\n{\n\n if ((res = isrpmvuln(pkg:\"libdesignercore1\", rpm:\"libdesignercore1~3.3.8~4.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libeditor1\", rpm:\"libeditor1~3.3.8~4.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqassistant1\", rpm:\"libqassistant1~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqassistantclient1\", rpm:\"libqassistantclient1~3.3.8~4.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqt3\", rpm:\"libqt3~3.3.8~4.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqt3-devel\", rpm:\"libqt3-devel~3.3.8~4.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqt3-mysql\", rpm:\"libqt3-mysql~3.3.8~4.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqt3-odbc\", rpm:\"libqt3-odbc~3.3.8~4.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqt3-psql\", rpm:\"libqt3-psql~3.3.8~4.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqt3-sqlite\", rpm:\"libqt3-sqlite~3.3.8~4.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqt3-static-devel\", rpm:\"libqt3-static-devel~3.3.8~4.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqt3support4\", rpm:\"libqt3support4~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqt4-devel\", rpm:\"libqt4-devel~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqtcore4\", rpm:\"libqtcore4~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqtdbus4\", rpm:\"libqtdbus4~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqtdesigner1\", rpm:\"libqtdesigner1~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqtgui4\", rpm:\"libqtgui4~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqtnetwork4\", rpm:\"libqtnetwork4~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqtopengl4\", rpm:\"libqtopengl4~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqtsql4\", rpm:\"libqtsql4~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqtsvg4\", rpm:\"libqtsvg4~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqttest4\", rpm:\"libqttest4~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqtuitools4\", rpm:\"libqtuitools4~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqtxml4\", rpm:\"libqtxml4~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt3-common\", rpm:\"qt3-common~3.3.8~4.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt3-doc\", rpm:\"qt3-doc~3.3.8~4.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt3-example\", rpm:\"qt3-example~3.3.8~4.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt3-tutorial\", rpm:\"qt3-tutorial~3.3.8~4.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-accessibility-plugin-lib\", rpm:\"qt4-accessibility-plugin-lib~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-assistant\", rpm:\"qt4-assistant~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-codecs-plugin-lib\", rpm:\"qt4-codecs-plugin-lib~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-common\", rpm:\"qt4-common~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-database-plugin-mysql-lib\", rpm:\"qt4-database-plugin-mysql-lib~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-database-plugin-odbc-lib\", rpm:\"qt4-database-plugin-odbc-lib~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-database-plugin-pgsql-lib\", rpm:\"qt4-database-plugin-pgsql-lib~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-database-plugin-sqlite-lib\", rpm:\"qt4-database-plugin-sqlite-lib~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-designer\", rpm:\"qt4-designer~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-doc\", rpm:\"qt4-doc~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-examples\", rpm:\"qt4-examples~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-linguist\", rpm:\"qt4-linguist~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-qvfb\", rpm:\"qt4-qvfb~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-tutorial\", rpm:\"qt4-tutorial~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt3\", rpm:\"qt3~3.3.8~4.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4\", rpm:\"qt4~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64designercore1\", rpm:\"lib64designercore1~3.3.8~4.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64editor1\", rpm:\"lib64editor1~3.3.8~4.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qassistant1\", rpm:\"lib64qassistant1~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qassistantclient1\", rpm:\"lib64qassistantclient1~3.3.8~4.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qt3\", rpm:\"lib64qt3~3.3.8~4.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qt3-devel\", rpm:\"lib64qt3-devel~3.3.8~4.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qt3-mysql\", rpm:\"lib64qt3-mysql~3.3.8~4.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qt3-odbc\", rpm:\"lib64qt3-odbc~3.3.8~4.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qt3-psql\", rpm:\"lib64qt3-psql~3.3.8~4.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qt3-sqlite\", rpm:\"lib64qt3-sqlite~3.3.8~4.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qt3-static-devel\", rpm:\"lib64qt3-static-devel~3.3.8~4.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qt3support4\", rpm:\"lib64qt3support4~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qt4-devel\", rpm:\"lib64qt4-devel~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qtcore4\", rpm:\"lib64qtcore4~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qtdbus4\", rpm:\"lib64qtdbus4~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qtdesigner1\", rpm:\"lib64qtdesigner1~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qtgui4\", rpm:\"lib64qtgui4~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qtnetwork4\", rpm:\"lib64qtnetwork4~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qtopengl4\", rpm:\"lib64qtopengl4~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qtsql4\", rpm:\"lib64qtsql4~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qtsvg4\", rpm:\"lib64qtsvg4~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qttest4\", rpm:\"lib64qttest4~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qtuitools4\", rpm:\"lib64qtuitools4~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qtxml4\", rpm:\"lib64qtxml4~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-accessibility-plugin-lib64\", rpm:\"qt4-accessibility-plugin-lib64~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-codecs-plugin-lib64\", rpm:\"qt4-codecs-plugin-lib64~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-database-plugin-mysql-lib64\", rpm:\"qt4-database-plugin-mysql-lib64~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-database-plugin-odbc-lib64\", rpm:\"qt4-database-plugin-odbc-lib64~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-database-plugin-pgsql-lib64\", rpm:\"qt4-database-plugin-pgsql-lib64~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-database-plugin-sqlite-lib64\", rpm:\"qt4-database-plugin-sqlite-lib64~4.2.3~3.2mdv2007.1\", rls:\"MNDK_2007.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"MNDK_2007.0\")\n{\n\n if ((res = isrpmvuln(pkg:\"libdesignercore1\", rpm:\"libdesignercore1~3.3.6~18.4mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libeditor1\", rpm:\"libeditor1~3.3.6~18.4mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqassistant1\", rpm:\"libqassistant1~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqassistantclient1\", rpm:\"libqassistantclient1~3.3.6~18.4mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqt3\", rpm:\"libqt3~3.3.6~18.4mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqt3-devel\", rpm:\"libqt3-devel~3.3.6~18.4mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqt3-mysql\", rpm:\"libqt3-mysql~3.3.6~18.4mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqt3-odbc\", rpm:\"libqt3-odbc~3.3.6~18.4mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqt3-psql\", rpm:\"libqt3-psql~3.3.6~18.4mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqt3-sqlite\", rpm:\"libqt3-sqlite~3.3.6~18.4mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqt3-static-devel\", rpm:\"libqt3-static-devel~3.3.6~18.4mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqt3support4\", rpm:\"libqt3support4~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqt4-devel\", rpm:\"libqt4-devel~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqtcore4\", rpm:\"libqtcore4~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqtdesigner1\", rpm:\"libqtdesigner1~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqtgui4\", rpm:\"libqtgui4~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqtnetwork4\", rpm:\"libqtnetwork4~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqtopengl4\", rpm:\"libqtopengl4~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqtsql4\", rpm:\"libqtsql4~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqtsvg4\", rpm:\"libqtsvg4~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqttest4\", rpm:\"libqttest4~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqtuitools4\", rpm:\"libqtuitools4~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libqtxml4\", rpm:\"libqtxml4~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt3-common\", rpm:\"qt3-common~3.3.6~18.4mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt3-doc\", rpm:\"qt3-doc~3.3.6~18.4mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt3-example\", rpm:\"qt3-example~3.3.6~18.4mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt3-tutorial\", rpm:\"qt3-tutorial~3.3.6~18.4mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-accessibility-plugin-lib\", rpm:\"qt4-accessibility-plugin-lib~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-assistant\", rpm:\"qt4-assistant~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-common\", rpm:\"qt4-common~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-database-plugin-mysql-lib\", rpm:\"qt4-database-plugin-mysql-lib~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-database-plugin-odbc-lib\", rpm:\"qt4-database-plugin-odbc-lib~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-database-plugin-pgsql-lib\", rpm:\"qt4-database-plugin-pgsql-lib~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-database-plugin-sqlite-lib\", rpm:\"qt4-database-plugin-sqlite-lib~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-designer\", rpm:\"qt4-designer~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-doc\", rpm:\"qt4-doc~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-examples\", rpm:\"qt4-examples~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-linguist\", rpm:\"qt4-linguist~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-tutorial\", rpm:\"qt4-tutorial~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt3\", rpm:\"qt3~3.3.6~18.4mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4\", rpm:\"qt4~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64designercore1\", rpm:\"lib64designercore1~3.3.6~18.4mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64editor1\", rpm:\"lib64editor1~3.3.6~18.4mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qassistant1\", rpm:\"lib64qassistant1~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qassistantclient1\", rpm:\"lib64qassistantclient1~3.3.6~18.4mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qt3\", rpm:\"lib64qt3~3.3.6~18.4mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qt3-devel\", rpm:\"lib64qt3-devel~3.3.6~18.4mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qt3-mysql\", rpm:\"lib64qt3-mysql~3.3.6~18.4mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qt3-odbc\", rpm:\"lib64qt3-odbc~3.3.6~18.4mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qt3-psql\", rpm:\"lib64qt3-psql~3.3.6~18.4mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qt3-sqlite\", rpm:\"lib64qt3-sqlite~3.3.6~18.4mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qt3-static-devel\", rpm:\"lib64qt3-static-devel~3.3.6~18.4mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qt3support4\", rpm:\"lib64qt3support4~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qt4-devel\", rpm:\"lib64qt4-devel~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qtcore4\", rpm:\"lib64qtcore4~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qtdesigner1\", rpm:\"lib64qtdesigner1~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qtgui4\", rpm:\"lib64qtgui4~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qtnetwork4\", rpm:\"lib64qtnetwork4~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qtopengl4\", rpm:\"lib64qtopengl4~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qtsql4\", rpm:\"lib64qtsql4~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qtsvg4\", rpm:\"lib64qtsvg4~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qttest4\", rpm:\"lib64qttest4~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qtuitools4\", rpm:\"lib64qtuitools4~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"lib64qtxml4\", rpm:\"lib64qtxml4~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-accessibility-plugin-lib64\", rpm:\"qt4-accessibility-plugin-lib64~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-database-plugin-mysql-lib64\", rpm:\"qt4-database-plugin-mysql-lib64~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-database-plugin-odbc-lib64\", rpm:\"qt4-database-plugin-odbc-lib64~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-database-plugin-pgsql-lib64\", rpm:\"qt4-database-plugin-pgsql-lib64~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt4-database-plugin-sqlite-lib64\", rpm:\"qt4-database-plugin-sqlite-lib64~4.1.4~12.3mdv2007.0\", rls:\"MNDK_2007.0\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-05-29T18:36:30", "description": "Oracle Linux Local Security Checks ELSA-2007-0883", "cvss3": {}, "published": "2015-10-08T00:00:00", "type": "openvas", "title": "Oracle Linux Local Check: ELSA-2007-0883", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2007-0242", "CVE-2007-4137"], "modified": "2018-09-28T00:00:00", "id": "OPENVAS:1361412562310122664", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310122664", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: ELSA-2007-0883.nasl 11688 2018-09-28 13:36:28Z cfischer $\n#\n# Oracle Linux Local Check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.122664\");\n script_version(\"$Revision: 11688 $\");\n script_tag(name:\"creation_date\", value:\"2015-10-08 14:50:34 +0300 (Thu, 08 Oct 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-09-28 15:36:28 +0200 (Fri, 28 Sep 2018) $\");\n script_name(\"Oracle Linux Local Check: ELSA-2007-0883\");\n script_tag(name:\"insight\", value:\"ELSA-2007-0883 - Important: qt security update. Please see the references for more insight.\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"summary\", value:\"Oracle Linux Local Security Checks ELSA-2007-0883\");\n script_xref(name:\"URL\", value:\"http://linux.oracle.com/errata/ELSA-2007-0883.html\");\n script_cve_id(\"CVE-2007-0242\", \"CVE-2007-4137\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/oracle_linux\", \"ssh/login/release\", re:\"ssh/login/release=OracleLinux5\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Eero Volotinen\");\n script_family(\"Oracle Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"OracleLinux5\")\n{\n if ((res = isrpmvuln(pkg:\"qt\", rpm:\"qt~3.3.6~23.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"qt-MySQL\", rpm:\"qt-MySQL~3.3.6~23.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"qt-ODBC\", rpm:\"qt-ODBC~3.3.6~23.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"qt-PostgreSQL\", rpm:\"qt-PostgreSQL~3.3.6~23.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"qt-config\", rpm:\"qt-config~3.3.6~23.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"qt-designer\", rpm:\"qt-designer~3.3.6~23.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"qt-devel\", rpm:\"qt-devel~3.3.6~23.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n if ((res = isrpmvuln(pkg:\"qt-devel-docs\", rpm:\"qt-devel-docs~3.3.6~23.el5\", rls:\"OracleLinux5\")) != NULL) {\n security_message(data:res);\n exit(0);\n }\n\n}\nif (__pkg_match) exit(99);\n exit(0);\n\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2017-07-24T12:50:00", "description": "The remote host is missing an update to qt-x11-free\nannounced via advisory DSA 1426-1.", "cvss3": {}, "published": "2008-01-17T00:00:00", "type": "openvas", "title": "Debian Security Advisory DSA 1426-1 (qt-x11-free)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2007-3388", "CVE-2007-4137"], "modified": "2017-07-07T00:00:00", "id": "OPENVAS:59960", "href": "http://plugins.openvas.org/nasl.php?oid=59960", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_1426_1.nasl 6616 2017-07-07 12:10:49Z cfischer $\n# Description: Auto-generated from advisory DSA 1426-1\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largerly excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Several local/remote vulnerabilities have been discovered in the Qt GUI\nLibrary. The Common Vulnerabilities and Exposures project identifies the\nfollowing problems:\n\nCVE-2007-3388\n\nTim Brown and Dirk M\u00fcller discovered several format string\nvulnerabilities in the handling of error messages, which might lead\nto the execution of arbitrary code.\n\nCVE-2007-4137\n\nDirk M\u00fcller discovered an off-by-one buffer overflow in the Unicode\nhandling, which might lead to the execution of arbitrary code.\n\nFor the old stable distribution (sarge), these problems have been fixed\nin version 3:3.3.4-3sarge3. Packages for m68k will be provided later.\n\nFor the stable distribution (etch), these problems have been fixed in\nversion 3:3.3.7-4etch1.\n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 3:3.3.7-8.\n\nWe recommend that you upgrade your qt-x11-free packages.\";\ntag_summary = \"The remote host is missing an update to qt-x11-free\nannounced via advisory DSA 1426-1.\";\n\ntag_solution = \"https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201426-1\";\n\nif(description)\n{\n script_id(59960);\n script_version(\"$Revision: 6616 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 14:10:49 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2008-01-17 23:23:47 +0100 (Thu, 17 Jan 2008)\");\n script_cve_id(\"CVE-2007-3388\", \"CVE-2007-4137\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_name(\"Debian Security Advisory DSA 1426-1 (qt-x11-free)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"libqt3-i18n\", ver:\"3.3.4-3sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"qt3-doc\", ver:\"3.3.4-3sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"qt3-examples\", ver:\"3.3.4-3sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libqt3c102-mt-mysql\", ver:\"3.3.4-3sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libqt3c102-psql\", ver:\"3.3.4-3sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"qt3-dev-tools\", ver:\"3.3.4-3sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libqt3-compat-headers\", ver:\"3.3.4-3sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"qt3-dev-tools-compat\", ver:\"3.3.4-3sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"qt3-qtconfig\", ver:\"3.3.4-3sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libqt3-mt-dev\", ver:\"3.3.4-3sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libqt3c102-mysql\", ver:\"3.3.4-3sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libqt3c102\", ver:\"3.3.4-3sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libqt3c102-mt-sqlite\", ver:\"3.3.4-3sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libqt3c102-mt-psql\", ver:\"3.3.4-3sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libqt3-headers\", ver:\"3.3.4-3sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"qt3-designer\", ver:\"3.3.4-3sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libqt3c102-mt\", ver:\"3.3.4-3sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libqt3c102-mt-odbc\", ver:\"3.3.4-3sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libqt3c102-odbc\", ver:\"3.3.4-3sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"qt3-dev-tools-embedded\", ver:\"3.3.4-3sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"qt3-assistant\", ver:\"3.3.4-3sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"qt3-apps-dev\", ver:\"3.3.4-3sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"qt3-linguist\", ver:\"3.3.4-3sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libqt3c102-sqlite\", ver:\"3.3.4-3sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libqt3-dev\", ver:\"3.3.4-3sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libqt3c102-mt-ibase\", ver:\"3.3.4-3sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libqt3c102-ibase\", ver:\"3.3.4-3sarge3\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"qt3-examples\", ver:\"3.3.7-4etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"qt3-doc\", ver:\"3.3.7-4etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libqt3-i18n\", ver:\"3.3.7-4etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"qt3-dev-tools-embedded\", ver:\"3.3.7-4etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libqt3-mt-odbc\", ver:\"3.3.7-4etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libqt3-mt-dev\", ver:\"3.3.7-4etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"qt3-dev-tools-compat\", ver:\"3.3.7-4etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"qt3-linguist\", ver:\"3.3.7-4etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"qt3-designer\", ver:\"3.3.7-4etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libqt3-headers\", ver:\"3.3.7-4etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libqt3-mt-psql\", ver:\"3.3.7-4etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"qt3-qtconfig\", ver:\"3.3.7-4etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"qt3-assistant\", ver:\"3.3.7-4etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libqt3-mt-sqlite\", ver:\"3.3.7-4etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"qt3-apps-dev\", ver:\"3.3.7-4etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"qt-x11-free-dbg\", ver:\"3.3.7-4etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libqt3-mt-mysql\", ver:\"3.3.7-4etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libqt3-mt\", ver:\"3.3.7-4etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libqt3-compat-headers\", ver:\"3.3.7-4etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"qt3-dev-tools\", ver:\"3.3.7-4etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libqt3-mt-ibase\", ver:\"3.3.7-4etch1\", rls:\"DEB4.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-07-24T12:49:53", "description": "The remote host is missing updates announced in\nadvisory GLSA 200712-08.", "cvss3": {}, "published": "2008-09-24T00:00:00", "type": "openvas", "title": "Gentoo Security Advisory GLSA 200712-08 (emul-linux-x86-qtlibs)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2007-3388", "CVE-2007-4137"], "modified": "2017-07-07T00:00:00", "id": "OPENVAS:59970", "href": "http://plugins.openvas.org/nasl.php?oid=59970", "sourceData": "# OpenVAS Vulnerability Test\n# $\n# Description: Auto generated from Gentoo's XML based advisory\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Multiple vulnerabilities in the AMD64 x86 emulation Qt library may lead to\nthe remote execution of arbitrary code in Qt applications.\";\ntag_solution = \"All AMD64 x86 emulation Qt library users should upgrade to the latest\nversion:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose '>=app-emulation/emul-linux-x86-qtlibs-20071114-r2'\n\nhttp://www.securityspace.com/smysecure/catid.html?in=GLSA%20200712-08\nhttp://bugs.gentoo.org/show_bug.cgi?id=189536\nhttp://www.gentoo.org/security/en/glsa/glsa-200708-16.xml\nhttp://www.gentoo.org/security/en/glsa/glsa-200710-28.xml\";\ntag_summary = \"The remote host is missing updates announced in\nadvisory GLSA 200712-08.\";\n\n \n\nif(description)\n{\n script_id(59970);\n script_cve_id(\"CVE-2007-3388\",\"CVE-2007-4137\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_version(\"$Revision: 6596 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 11:21:37 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2008-09-24 21:14:03 +0200 (Wed, 24 Sep 2008)\");\n script_name(\"Gentoo Security Advisory GLSA 200712-08 (emul-linux-x86-qtlibs)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Gentoo Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/gentoo\", \"ssh/login/pkg\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-gentoo.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = ispkgvuln(pkg:\"app-emulation/emul-linux-x86-qtlibs\", unaffected: make_list(\"ge 20071114-r2\"), vulnerable: make_list(\"lt 20071114-r2\"))) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-07-25T10:56:06", "description": "Check for the Version of qt", "cvss3": {}, "published": "2009-02-27T00:00:00", "type": "openvas", "title": "Fedora Update for qt FEDORA-2007-2216", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2007-3388", "CVE-2007-4137"], "modified": "2017-07-10T00:00:00", "id": "OPENVAS:861158", "href": "http://plugins.openvas.org/nasl.php?oid=861158", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for qt FEDORA-2007-2216\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Qt is a GUI software toolkit which simplifies the task of writing and\n maintaining GUI (Graphical User Interface) applications\n for the X Window System.\n\n Qt is written in C++ and is fully object-oriented.\n \n This package contains the shared library needed to run qt\n applications, as well as the README files for qt.\";\n\ntag_affected = \"qt on Fedora 7\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00322.html\");\n script_id(861158);\n script_version(\"$Revision: 6623 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 08:10:20 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-02-27 16:01:32 +0100 (Fri, 27 Feb 2009)\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"FEDORA\", value: \"2007-2216\");\n script_cve_id(\"CVE-2007-4137\", \"CVE-2007-3388\");\n script_name( \"Fedora Update for qt FEDORA-2007-2216\");\n\n script_summary(\"Check for the Version of qt\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC7\")\n{\n\n if ((res = isrpmvuln(pkg:\"qt\", rpm:\"qt~3.3.8~7.fc7\", rls:\"FC7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt-debuginfo\", rpm:\"qt-debuginfo~3.3.8~7.fc7\", rls:\"FC7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt-devel\", rpm:\"qt-devel~3.3.8~7.fc7\", rls:\"FC7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt-PostgreSQL\", rpm:\"qt-PostgreSQL~3.3.8~7.fc7\", rls:\"FC7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt-designer\", rpm:\"qt-designer~3.3.8~7.fc7\", rls:\"FC7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt\", rpm:\"qt~3.3.8~7.fc7\", rls:\"FC7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt-ODBC\", rpm:\"qt-ODBC~3.3.8~7.fc7\", rls:\"FC7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt-config\", rpm:\"qt-config~3.3.8~7.fc7\", rls:\"FC7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt-devel-docs\", rpm:\"qt-devel-docs~3.3.8~7.fc7\", rls:\"FC7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt-MySQL\", rpm:\"qt-MySQL~3.3.8~7.fc7\", rls:\"FC7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt-sqlite\", rpm:\"qt-sqlite~3.3.8~7.fc7\", rls:\"FC7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt-config\", rpm:\"qt-config~3.3.8~7.fc7\", rls:\"FC7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt-PostgreSQL\", rpm:\"qt-PostgreSQL~3.3.8~7.fc7\", rls:\"FC7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt-ODBC\", rpm:\"qt-ODBC~3.3.8~7.fc7\", rls:\"FC7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt-MySQL\", rpm:\"qt-MySQL~3.3.8~7.fc7\", rls:\"FC7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt-debuginfo\", rpm:\"qt-debuginfo~3.3.8~7.fc7\", rls:\"FC7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt-devel-docs\", rpm:\"qt-devel-docs~3.3.8~7.fc7\", rls:\"FC7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt-devel\", rpm:\"qt-devel~3.3.8~7.fc7\", rls:\"FC7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt-sqlite\", rpm:\"qt-sqlite~3.3.8~7.fc7\", rls:\"FC7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt-designer\", rpm:\"qt-designer~3.3.8~7.fc7\", rls:\"FC7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qt\", rpm:\"qt~3.3.8~7.fc7\", rls:\"FC7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2017-07-25T10:56:59", "description": "Check for the Version of qt", "cvss3": {}, "published": "2009-02-27T00:00:00", "type": "openvas", "title": "Fedora Update for qt FEDORA-2007-703", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2007-3388", "CVE-2007-0242", "CVE-2007-4137"], "modified": "2017-07-10T00:00:00", "id": "OPENVAS:861453", "href": "http://plugins.openvas.org/nasl.php?oid=861453", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for qt FEDORA-2007-703\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"Qt is a GUI software toolkit which simplifies the task of writing and\n maintaining GUI (Graphical User Interface) applications\n for the X Window System.\n\n Qt is written in C++ and is fully object-oriented.\n \n This package contains the shared library needed to run qt\n applications, as well as the README files for qt\";\n\ntag_affected = \"qt on Fedora Core 6\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_xref(name : \"URL\" , value : \"https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00310.html\");\n script_id(861453);\n script_version(\"$Revision: 6622 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-10 07:52:50 +0200 (Mon, 10 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-02-27 16:31:39 +0100 (Fri, 27 Feb 2009)\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_xref(name: \"FEDORA\", value: \"2007-703\");\n script_cve_id(\"CVE-2007-4137\", \"CVE-2007-3388\", \"CVE-2007-0242\");\n script_name( \"Fedora Update for qt FEDORA-2007-703\");\n\n script_summary(\"Check for the Version of qt\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora_core\", \"ssh/login/rpms\");\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"FC6\")\n{\n\n if ((res = isrpmvuln(pkg:\"qt\", rpm:\"qt~3.3.8~2.fc6\", rls:\"FC6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x86_64/qt-ODBC\", rpm:\"x86_64/qt-ODBC~3.3.8~2.fc6\", rls:\"FC6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x86_64/qt-devel\", rpm:\"x86_64/qt-devel~3.3.8~2.fc6\", rls:\"FC6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x86_64/qt\", rpm:\"x86_64/qt~3.3.8~2.fc6\", rls:\"FC6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x86_64/qt-designer\", rpm:\"x86_64/qt-designer~3.3.8~2.fc6\", rls:\"FC6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x86_64/qt-devel-docs\", rpm:\"x86_64/qt-devel-docs~3.3.8~2.fc6\", rls:\"FC6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x86_64/qt-PostgreSQL\", rpm:\"x86_64/qt-PostgreSQL~3.3.8~2.fc6\", rls:\"FC6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x86_64/qt-config\", rpm:\"x86_64/qt-config~3.3.8~2.fc6\", rls:\"FC6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x86_64/debug/qt-debuginfo\", rpm:\"x86_64/debug/qt-debuginfo~3.3.8~2.fc6\", rls:\"FC6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"x86_64/qt-MySQL\", rpm:\"x86_64/qt-MySQL~3.3.8~2.fc6\", rls:\"FC6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"i386/qt-designer\", rpm:\"i386/qt-designer~3.3.8~2.fc6\", rls:\"FC6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"i386/debug/qt-debuginfo\", rpm:\"i386/debug/qt-debuginfo~3.3.8~2.fc6\", rls:\"FC6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"i386/qt-config\", rpm:\"i386/qt-config~3.3.8~2.fc6\", rls:\"FC6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"i386/qt-MySQL\", rpm:\"i386/qt-MySQL~3.3.8~2.fc6\", rls:\"FC6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"i386/qt-devel\", rpm:\"i386/qt-devel~3.3.8~2.fc6\", rls:\"FC6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"i386/qt\", rpm:\"i386/qt~3.3.8~2.fc6\", rls:\"FC6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"i386/qt-PostgreSQL\", rpm:\"i386/qt-PostgreSQL~3.3.8~2.fc6\", rls:\"FC6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"i386/qt-ODBC\", rpm:\"i386/qt-ODBC~3.3.8~2.fc6\", rls:\"FC6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"i386/qt-devel-docs\", rpm:\"i386/qt-devel-docs~3.3.8~2.fc6\", rls:\"FC6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "ubuntu": [{"lastseen": "2022-01-04T13:35:20", "description": "Dirk Mueller discovered that UTF8 strings could be made to cause a small \nbuffer overflow. A remote attacker could exploit this by sending specially \ncrafted strings to applications that use the Qt3 library for UTF8 processing, \npotentially leading to arbitrary code execution with user privileges, or a \ndenial of service.\n", "cvss3": {}, "published": "2007-09-18T00:00:00", "type": "ubuntu", "title": "Qt vulnerability", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": true, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2007-4137"], "modified": "2007-09-18T00:00:00", "id": "USN-513-1", "href": "https://ubuntu.com/security/notices/USN-513-1", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "cve": [{"lastseen": "2022-03-23T12:52:24", "description": "Off-by-one error in the QUtf8Decoder::toUnicode function in Trolltech Qt 3 allows context-dependent attackers to cause a denial of service (crash) via a crafted Unicode string that triggers a heap-based buffer overflow. NOTE: Qt 4 has the same error in the QUtf8Codec::convertToUnicode function, but it is not exploitable.", "cvss3": {}, "published": "2007-09-18T19:17:00", "type": "cve", "title": "CVE-2007-4137", "cwe": ["CWE-119"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": true, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2007-4137"], "modified": "2018-10-15T21:33:00", "cpe": ["cpe:/a:trolltech:qt:4.1.5", "cpe:/a:trolltech:qt:4.1", "cpe:/a:trolltech:qt:3.1", "cpe:/a:trolltech:qt:3.2.3", "cpe:/a:trolltech:qt:3.3.5", "cpe:/a:trolltech:qt:3.3.2", "cpe:/a:trolltech:qt:3.1.1", "cpe:/a:trolltech:qt:3.2.1", "cpe:/a:trolltech:qt:4.2", "cpe:/a:trolltech:qt:3.3.8", "cpe:/a:trolltech:qt:3.3.1", "cpe:/a:trolltech:qt:3.3.0", "cpe:/a:trolltech:qt:3.3.3", "cpe:/a:trolltech:qt:3.0.3", "cpe:/a:trolltech:qt:3.3.7", "cpe:/a:trolltech:qt:4.2.3", "cpe:/a:trolltech:qt:3.1.2", "cpe:/a:trolltech:qt:3.3.4", "cpe:/a:trolltech:qt:4.2.1", "cpe:/a:trolltech:qt:4.1.4", "cpe:/a:trolltech:qt:3.3.6", "cpe:/a:trolltech:qt:3.0", "cpe:/a:trolltech:qt:3.0.5"], "id": "CVE-2007-4137", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-4137", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:trolltech:qt:3.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:trolltech:qt:3.3.7:*:*:*:*:*:*:*", "cpe:2.3:a:trolltech:qt:4.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:trolltech:qt:3.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:trolltech:qt:3.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:trolltech:qt:3.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:trolltech:qt:3.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:trolltech:qt:3.3.8:*:*:*:*:*:*:*", "cpe:2.3:a:trolltech:qt:3.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:trolltech:qt:3.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:trolltech:qt:3.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:trolltech:qt:4.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:trolltech:qt:3.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:trolltech:qt:3.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:trolltech:qt:3.1:*:*:*:*:*:*:*", "cpe:2.3:a:trolltech:qt:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:trolltech:qt:3.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:trolltech:qt:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:trolltech:qt:3.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:trolltech:qt:4.2:*:*:*:*:*:*:*", "cpe:2.3:a:trolltech:qt:4.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:trolltech:qt:4.1:*:*:*:*:*:*:*", "cpe:2.3:a:trolltech:qt:3.3.4:*:*:*:*:*:*:*"]}], "debiancve": [{"lastseen": "2021-12-14T17:52:16", "description": "Off-by-one error in the QUtf8Decoder::toUnicode function in Trolltech Qt 3 allows context-dependent attackers to cause a denial of service (crash) via a crafted Unicode string that triggers a heap-based buffer overflow. NOTE: Qt 4 has the same error in the QUtf8Codec::convertToUnicode function, but it is not exploitable.", "cvss3": {}, "published": "2007-09-18T19:17:00", "type": "debiancve", "title": "CVE-2007-4137", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": true, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2007-4137"], "modified": "2007-09-18T19:17:00", "id": "DEBIANCVE:CVE-2007-4137", "href": "https://security-tracker.debian.org/tracker/CVE-2007-4137", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "securityvulns": [{"lastseen": "2018-08-31T11:10:23", "description": "\r\n-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\n _______________________________________________________________________\r\n \r\n Mandriva Linux Security Advisory MDKSA-2007:183\r\n http://www.mandriva.com/security/\r\n _______________________________________________________________________\r\n \r\n Package : qt\r\n Date : September 13, 2007\r\n Affected: 2007.0, 2007.1, Corporate 3.0, Corporate 4.0\r\n _______________________________________________________________________\r\n \r\n Problem Description:\r\n \r\n A buffer overflow was found in how Qt expanded malformed Unicode\r\n strings. If an application linked against Qt parsed a malicious\r\n Unicode string, it could lead to a denial of service or potentially\r\n allow for the execution of arbitrary code.\r\n \r\n Updated packages have been patched to prevent this issue. Although the\r\n problem is not exploitable in Qt4, patched packages have been issued\r\n regardless.\r\n _______________________________________________________________________\r\n\r\n References:\r\n \r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4137\r\n http://trolltech.com/company/newsroom/announcements/press.2007-09-03.7564032119\r\n _______________________________________________________________________\r\n \r\n Updated Packages:\r\n \r\n Mandriva Linux 2007.0:\r\n b67ab0207d149a36b937dec7ba21df2b 2007.0/i586/libdesignercore1-3.3.6-18.4mdv2007.0.i586.rpm\r\n 8cb621ede60efd668e34bbe4e7da65ec 2007.0/i586/libeditor1-3.3.6-18.4mdv2007.0.i586.rpm\r\n 4ed3e18f85eb12964160da14af76062a 2007.0/i586/libqassistant1-4.1.4-12.3mdv2007.0.i586.rpm\r\n 503afebb79fd5efa52a609274141b95f 2007.0/i586/libqassistantclient1-3.3.6-18.4mdv2007.0.i586.rpm\r\n 58779c535a109545332d6cbd0ec82b3a 2007.0/i586/libqt3-3.3.6-18.4mdv2007.0.i586.rpm\r\n 73abda10046a832be47a764954116797 2007.0/i586/libqt3-devel-3.3.6-18.4mdv2007.0.i586.rpm\r\n 797bb815e58580acd666e67e3a2ba932 2007.0/i586/libqt3-mysql-3.3.6-18.4mdv2007.0.i586.rpm\r\n d662291a2c604ffb7e2bea9451ad343e 2007.0/i586/libqt3-odbc-3.3.6-18.4mdv2007.0.i586.rpm\r\n adab245ffdd045f7d5e9bd33e5396632 2007.0/i586/libqt3-psql-3.3.6-18.4mdv2007.0.i586.rpm\r\n 396366cdd22954ac7084e426a41f6aa9 2007.0/i586/libqt3-sqlite-3.3.6-18.4mdv2007.0.i586.rpm\r\n f72a52409d3a034bf6eaf0ee6a0e99c0 2007.0/i586/libqt3-static-devel-3.3.6-18.4mdv2007.0.i586.rpm\r\n e6ee035f92b8c32f92c99b9784d161b1 2007.0/i586/libqt3support4-4.1.4-12.3mdv2007.0.i586.rpm\r\n d637cb60749e004b7791b5af16f1512b 2007.0/i586/libqt4-devel-4.1.4-12.3mdv2007.0.i586.rpm\r\n c5fe21b5d2609ceebfb03afde200ddac 2007.0/i586/libqtcore4-4.1.4-12.3mdv2007.0.i586.rpm\r\n 119e66581f89072600efb791ebcc6019 2007.0/i586/libqtdesigner1-4.1.4-12.3mdv2007.0.i586.rpm\r\n cbfa854eac1baee575e8efaf0f286660 2007.0/i586/libqtgui4-4.1.4-12.3mdv2007.0.i586.rpm\r\n a16547a96acca343753a960856cdb009 2007.0/i586/libqtnetwork4-4.1.4-12.3mdv2007.0.i586.rpm\r\n 06883ab1da64a89526734a88ed0e6259 2007.0/i586/libqtopengl4-4.1.4-12.3mdv2007.0.i586.rpm\r\n 60ae53199ba6b4f7c59b9eb216112927 2007.0/i586/libqtsql4-4.1.4-12.3mdv2007.0.i586.rpm\r\n a12b5fc01e8c173745c948b60ffe087e 2007.0/i586/libqtsvg4-4.1.4-12.3mdv2007.0.i586.rpm\r\n e0dec7b888fd4b844bb2663875679e87 2007.0/i586/libqttest4-4.1.4-12.3mdv2007.0.i586.rpm\r\n 83ab79b4321270a9a44d998f427f6347 2007.0/i586/libqtuitools4-4.1.4-12.3mdv2007.0.i586.rpm\r\n b1f49fbe1e86a29628d4fdd435c25d35 2007.0/i586/libqtxml4-4.1.4-12.3mdv2007.0.i586.rpm\r\n 95d4e1e611b8de8b5b212500644f58d5 2007.0/i586/qt3-common-3.3.6-18.4mdv2007.0.i586.rpm\r\n 79a9528809ee070977ca8ec993e541b2 2007.0/i586/qt3-doc-3.3.6-18.4mdv2007.0.i586.rpm\r\n d79abf895811513d262eb26dba43393c 2007.0/i586/qt3-example-3.3.6-18.4mdv2007.0.i586.rpm\r\n 755afd05d30965a07ebcebf19f79a2be 2007.0/i586/qt3-tutorial-3.3.6-18.4mdv2007.0.i586.rpm\r\n c92ce6cd59ed28a929ef72ba5a70457f 2007.0/i586/qt4-accessibility-plugin-lib-4.1.4-12.3mdv2007.0.i586.rpm\r\n 4964cc3771d71d403f0f606a54ff0df3 2007.0/i586/qt4-assistant-4.1.4-12.3mdv2007.0.i586.rpm\r\n 39a65c06f185e3a0cd1edd4b356851c4 2007.0/i586/qt4-common-4.1.4-12.3mdv2007.0.i586.rpm\r\n a1ed213f2742028e81a09615bc383d19 2007.0/i586/qt4-database-plugin-mysql-lib-4.1.4-12.3mdv2007.0.i586.rpm\r\n be79c3f4e984661975df8e95cf8edc59 2007.0/i586/qt4-database-plugin-odbc-lib-4.1.4-12.3mdv2007.0.i586.rpm\r\n 080f4925265da907970e653adcc6f458 2007.0/i586/qt4-database-plugin-pgsql-lib-4.1.4-12.3mdv2007.0.i586.rpm\r\n e42b45c76a4ab1be367494ca42d598a8 2007.0/i586/qt4-database-plugin-sqlite-lib-4.1.4-12.3mdv2007.0.i586.rpm\r\n 8b816ddd3281e795087f3855a31d3e70 2007.0/i586/qt4-designer-4.1.4-12.3mdv2007.0.i586.rpm\r\n fa1a4d32c6852c3399025fa460cb6f74 2007.0/i586/qt4-doc-4.1.4-12.3mdv2007.0.i586.rpm\r\n 5489ac16bbe0c745ca7149f48820500d 2007.0/i586/qt4-examples-4.1.4-12.3mdv2007.0.i586.rpm\r\n eea0cbef0a9f1dad1e8964087fe66652 2007.0/i586/qt4-linguist-4.1.4-12.3mdv2007.0.i586.rpm\r\n 6aac992ab53a26fcf0cc2703b65d7158 2007.0/i586/qt4-tutorial-4.1.4-12.3mdv2007.0.i586.rpm \r\n 7b1f8a62b8a2d294fefeb3c80e8cb7bb 2007.0/SRPMS/qt3-3.3.6-18.4mdv2007.0.src.rpm\r\n 8f4c2a2384273aaf6cdba38db3e2fdfc 2007.0/SRPMS/qt4-4.1.4-12.3mdv2007.0.src.rpm\r\n\r\n Mandriva Linux 2007.0/X86_64:\r\n ac928a081e8856f0f3420bd56638d173 2007.0/x86_64/lib64designercore1-3.3.6-18.4mdv2007.0.x86_64.rpm\r\n e47e8ec41212dfb6be96dfa80c4fd874 2007.0/x86_64/lib64editor1-3.3.6-18.4mdv2007.0.x86_64.rpm\r\n 96b2aba88a8bf1a80d208c0b53b51e3d 2007.0/x86_64/lib64qassistant1-4.1.4-12.3mdv2007.0.x86_64.rpm\r\n 0ef8b38bbf7e729d168190c2bb97dd39 2007.0/x86_64/lib64qassistantclient1-3.3.6-18.4mdv2007.0.x86_64.rpm\r\n 32f943536569578b4aafc4f656d628b1 2007.0/x86_64/lib64qt3-3.3.6-18.4mdv2007.0.x86_64.rpm\r\n 164e631ae8839f6d4b57f5168218e87d 2007.0/x86_64/lib64qt3-devel-3.3.6-18.4mdv2007.0.x86_64.rpm\r\n 352a0a33dc89e5c8cddf127f20b348a8 2007.0/x86_64/lib64qt3-mysql-3.3.6-18.4mdv2007.0.x86_64.rpm\r\n ed12375fce6a216e202357125e5f5ec1 2007.0/x86_64/lib64qt3-odbc-3.3.6-18.4mdv2007.0.x86_64.rpm\r\n 819220422aba5c28d8d911bb4ba06d91 2007.0/x86_64/lib64qt3-psql-3.3.6-18.4mdv2007.0.x86_64.rpm\r\n bad0d96070da82822c3d5733cbd451a7 2007.0/x86_64/lib64qt3-sqlite-3.3.6-18.4mdv2007.0.x86_64.rpm\r\n bc93d6a15084dce15a4295f151d14c47 2007.0/x86_64/lib64qt3-static-devel-3.3.6-18.4mdv2007.0.x86_64.rpm\r\n 1eccb207f8f75eea5ab4332762f12c5f 2007.0/x86_64/lib64qt3support4-4.1.4-12.3mdv2007.0.x86_64.rpm\r\n 2991636c4fe65029eac4d721e2fd17d6 2007.0/x86_64/lib64qt4-devel-4.1.4-12.3mdv2007.0.x86_64.rpm\r\n 7e82f029e25891a11af3b7ed75e0e487 2007.0/x86_64/lib64qtcore4-4.1.4-12.3mdv2007.0.x86_64.rpm\r\n 9cfa0aca6d773d87cc489900c65dbcbe 2007.0/x86_64/lib64qtdesigner1-4.1.4-12.3mdv2007.0.x86_64.rpm\r\n f24a707cc036d88d805b5106708f336b 2007.0/x86_64/lib64qtgui4-4.1.4-12.3mdv2007.0.x86_64.rpm\r\n fdfb5758032f84da0fab2bca83ad4cae 2007.0/x86_64/lib64qtnetwork4-4.1.4-12.3mdv2007.0.x86_64.rpm\r\n a028c64dd9e007184e2572aa7a1d05fa 2007.0/x86_64/lib64qtopengl4-4.1.4-12.3mdv2007.0.x86_64.rpm\r\n eda255a35faf953db1fcb07c13a94146 2007.0/x86_64/lib64qtsql4-4.1.4-12.3mdv2007.0.x86_64.rpm\r\n 8d6fb2d2e52b19c8a9a4728238c039e6 2007.0/x86_64/lib64qtsvg4-4.1.4-12.3mdv2007.0.x86_64.rpm\r\n 4242a71184422c81ecda2203ebcc185f 2007.0/x86_64/lib64qttest4-4.1.4-12.3mdv2007.0.x86_64.rpm\r\n efd081cd2aebfe84f71ab3624e8b94b6 2007.0/x86_64/lib64qtuitools4-4.1.4-12.3mdv2007.0.x86_64.rpm\r\n 2e0bc7efe3d4f93428e59d0ece634f08 2007.0/x86_64/lib64qtxml4-4.1.4-12.3mdv2007.0.x86_64.rpm\r\n 07cd6c33b8b7773feefc4dd259b46ff3 2007.0/x86_64/qt3-common-3.3.6-18.4mdv2007.0.x86_64.rpm\r\n 4423901184f0bc256b4ae13db5ead547 2007.0/x86_64/qt3-doc-3.3.6-18.4mdv2007.0.x86_64.rpm\r\n 71e79096013e6c109da06ef3f1695ed8 2007.0/x86_64/qt3-example-3.3.6-18.4mdv2007.0.x86_64.rpm\r\n 6a9019c3618f42ea038dd39536518bac 2007.0/x86_64/qt3-tutorial-3.3.6-18.4mdv2007.0.x86_64.rpm\r\n 2af1aad4011dc943f5899cd48300945b 2007.0/x86_64/qt4-accessibility-plugin-lib64-4.1.4-12.3mdv2007.0.x86_64.rpm\r\n 2310da1257745b2bc52878cb5930bd36 2007.0/x86_64/qt4-assistant-4.1.4-12.3mdv2007.0.x86_64.rpm\r\n 2152f911180011325dad460872b94cde 2007.0/x86_64/qt4-common-4.1.4-12.3mdv2007.0.x86_64.rpm\r\n a4b424b4647ac30517ba57bef3aa0eb3 2007.0/x86_64/qt4-database-plugin-mysql-lib64-4.1.4-12.3mdv2007.0.x86_64.rpm\r\n 9d6bb1e5318350f68ee57c6bd823669c 2007.0/x86_64/qt4-database-plugin-odbc-lib64-4.1.4-12.3mdv2007.0.x86_64.rpm\r\n 4376deb0ec10a7253088097e15f1e4ee 2007.0/x86_64/qt4-database-plugin-pgsql-lib64-4.1.4-12.3mdv2007.0.x86_64.rpm\r\n 1c298e5e38335aa6406320a8cfd25769 2007.0/x86_64/qt4-database-plugin-sqlite-lib64-4.1.4-12.3mdv2007.0.x86_64.rpm\r\n 94b71de10d3e8d178d8aab1d6dc36098 2007.0/x86_64/qt4-designer-4.1.4-12.3mdv2007.0.x86_64.rpm\r\n fa1428c38a3fd25bc533b96077e28eed 2007.0/x86_64/qt4-doc-4.1.4-12.3mdv2007.0.x86_64.rpm\r\n 7e1a9846547e604d1e8facbcbb4396a9 2007.0/x86_64/qt4-examples-4.1.4-12.3mdv2007.0.x86_64.rpm\r\n ad9b042fea2cb077c44468da2f942cc6 2007.0/x86_64/qt4-linguist-4.1.4-12.3mdv2007.0.x86_64.rpm\r\n 0261304ef0eeb1db5099380be3d13c72 2007.0/x86_64/qt4-tutorial-4.1.4-12.3mdv2007.0.x86_64.rpm \r\n 7b1f8a62b8a2d294fefeb3c80e8cb7bb 2007.0/SRPMS/qt3-3.3.6-18.4mdv2007.0.src.rpm\r\n 8f4c2a2384273aaf6cdba38db3e2fdfc 2007.0/SRPMS/qt4-4.1.4-12.3mdv2007.0.src.rpm\r\n\r\n Mandriva Linux 2007.1:\r\n bdaab92f027c71140084b3b6017b65d4 2007.1/i586/libdesignercore1-3.3.8-4.2mdv2007.1.i586.rpm\r\n 0cc71b294b06a378fe772aade7b5004d 2007.1/i586/libeditor1-3.3.8-4.2mdv2007.1.i586.rpm\r\n fa401af4a3d72d580faf595841d6ada0 2007.1/i586/libqassistant1-4.2.3-3.2mdv2007.1.i586.rpm\r\n 74dd9bb39b1bfc846bfb297f49a5814a 2007.1/i586/libqassistantclient1-3.3.8-4.2mdv2007.1.i586.rpm\r\n 6a64f5b5c8f99d75fa083f97c0db2bd7 2007.1/i586/libqt3-3.3.8-4.2mdv2007.1.i586.rpm\r\n aaebd36e00257d57d5b1c30ba4a22109 2007.1/i586/libqt3-devel-3.3.8-4.2mdv2007.1.i586.rpm\r\n 1d77dbc63c18613a9afbd70d7e95dbc1 2007.1/i586/libqt3-mysql-3.3.8-4.2mdv2007.1.i586.rpm\r\n 8e0ba7399543258ea559d62a5ee8644a 2007.1/i586/libqt3-odbc-3.3.8-4.2mdv2007.1.i586.rpm\r\n aa4fbb9ed341942d09ae1e2dd073647f 2007.1/i586/libqt3-psql-3.3.8-4.2mdv2007.1.i586.rpm\r\n 30e656a73baa2505a1f7769cb327f099 2007.1/i586/libqt3-sqlite-3.3.8-4.2mdv2007.1.i586.rpm\r\n 0f8add213b438a57b733c14bc0f40622 2007.1/i586/libqt3-static-devel-3.3.8-4.2mdv2007.1.i586.rpm\r\n 3722d7920b5d406b354dfe520f6acf2e 2007.1/i586/libqt3support4-4.2.3-3.2mdv2007.1.i586.rpm\r\n 982e330f707b3ba7976cc0455757cb62 2007.1/i586/libqt4-devel-4.2.3-3.2mdv2007.1.i586.rpm\r\n 49ea2f2494c73f147d3a6ddf93e3578a 2007.1/i586/libqtcore4-4.2.3-3.2mdv2007.1.i586.rpm\r\n 1a67893552f52944e860da15cdd37b5d 2007.1/i586/libqtdbus4-4.2.3-3.2mdv2007.1.i586.rpm\r\n da483416333c5fc9542382b828eebe9e 2007.1/i586/libqtdesigner1-4.2.3-3.2mdv2007.1.i586.rpm\r\n b4f0680d46e4acd34df2cd078fa61084 2007.1/i586/libqtgui4-4.2.3-3.2mdv2007.1.i586.rpm\r\n 4c127a09b01953ca968cdde266fb1e3a 2007.1/i586/libqtnetwork4-4.2.3-3.2mdv2007.1.i586.rpm\r\n 5b120788d8d11b9e64e59552487c95d2 2007.1/i586/libqtopengl4-4.2.3-3.2mdv2007.1.i586.rpm\r\n ac33dd207fac7da21e10af0d1471ddfc 2007.1/i586/libqtsql4-4.2.3-3.2mdv2007.1.i586.rpm\r\n 7d90f180ec8207037a4faf96c51e0d8b 2007.1/i586/libqtsvg4-4.2.3-3.2mdv2007.1.i586.rpm\r\n bbb796257a25a1352639f82718808b77 2007.1/i586/libqttest4-4.2.3-3.2mdv2007.1.i586.rpm\r\n c6b8a8c15e1c3aa093eaa9ebe9825694 2007.1/i586/libqtuitools4-4.2.3-3.2mdv2007.1.i586.rpm\r\n ce0d516dff2c748e259d1fb4bd529db3 2007.1/i586/libqtxml4-4.2.3-3.2mdv2007.1.i586.rpm\r\n a174c30e462582b5ec00b0af79985a0a 2007.1/i586/qt3-common-3.3.8-4.2mdv2007.1.i586.rpm\r\n 45761aa0ce0ab6d9539229dd032a7f65 2007.1/i586/qt3-doc-3.3.8-4.2mdv2007.1.i586.rpm\r\n 04b24dc8baafe56109306fd3c817c9c8 2007.1/i586/qt3-example-3.3.8-4.2mdv2007.1.i586.rpm\r\n b57d4c1823bc7867be05234dcb4fcc2b 2007.1/i586/qt3-tutorial-3.3.8-4.2mdv2007.1.i586.rpm\r\n 280469ea7a555490f416416807eb53a1 2007.1/i586/qt4-accessibility-plugin-lib-4.2.3-3.2mdv2007.1.i586.rpm\r\n c16741bf8736e216220fb52f509b036c 2007.1/i586/qt4-assistant-4.2.3-3.2mdv2007.1.i586.rpm\r\n 5bfbe39b4f23a2d9bec95df52cc73692 2007.1/i586/qt4-codecs-plugin-lib-4.2.3-3.2mdv2007.1.i586.rpm\r\n 721882f2dd844f96f36f8a2e2a66f3eb 2007.1/i586/qt4-common-4.2.3-3.2mdv2007.1.i586.rpm\r\n dd16d771f4952cd0ea88c121069b1818 2007.1/i586/qt4-database-plugin-mysql-lib-4.2.3-3.2mdv2007.1.i586.rpm\r\n 7712c6e344ab47360d4e51f3f58287d1 2007.1/i586/qt4-database-plugin-odbc-lib-4.2.3-3.2mdv2007.1.i586.rpm\r\n e17c57081cb0aed7cf750842c3c4b68c 2007.1/i586/qt4-database-plugin-pgsql-lib-4.2.3-3.2mdv2007.1.i586.rpm\r\n e980b675a8471aad607fdadc911402b8 2007.1/i586/qt4-database-plugin-sqlite-lib-4.2.3-3.2mdv2007.1.i586.rpm\r\n 7f460844f6b45f957c0eef16dbf88c5e 2007.1/i586/qt4-designer-4.2.3-3.2mdv2007.1.i586.rpm\r\n 7f18d2abe9b7effbf90ef87078bcf0fd 2007.1/i586/qt4-doc-4.2.3-3.2mdv2007.1.i586.rpm\r\n e28a1c3f8a52679402f06fa88bbe8950 2007.1/i586/qt4-examples-4.2.3-3.2mdv2007.1.i586.rpm\r\n 119e97cebeaa67a31cc3b58d9461c0e9 2007.1/i586/qt4-linguist-4.2.3-3.2mdv2007.1.i586.rpm\r\n 2ff61b2820a8071e0ac40c1b6339e654 2007.1/i586/qt4-qvfb-4.2.3-3.2mdv2007.1.i586.rpm\r\n 364989f911865c8b8ce5de73b258e1e3 2007.1/i586/qt4-tutorial-4.2.3-3.2mdv2007.1.i586.rpm \r\n bcfa6d5ed6bbabf21cd79569389ccdc1 2007.1/SRPMS/qt3-3.3.8-4.2mdv2007.1.src.rpm\r\n 07b5ad7fdb8c33feaca0987e0da75a12 2007.1/SRPMS/qt4-4.2.3-3.2mdv2007.1.src.rpm\r\n\r\n Mandriva Linux 2007.1/X86_64:\r\n b794e5860550ed3edbf34cceda33e89f 2007.1/x86_64/lib64designercore1-3.3.8-4.2mdv2007.1.x86_64.rpm\r\n aa9291cd0c07dd6ef4a076467224ed17 2007.1/x86_64/lib64editor1-3.3.8-4.2mdv2007.1.x86_64.rpm\r\n 5b6dba85af19467d4bf2b9208237a683 2007.1/x86_64/lib64qassistant1-4.2.3-3.2mdv2007.1.x86_64.rpm\r\n a3d72f4d337a4a0ecb10bee400b83b84 2007.1/x86_64/lib64qassistantclient1-3.3.8-4.2mdv2007.1.x86_64.rpm\r\n d94ffebf79cc8fdff43d8da9164d041e 2007.1/x86_64/lib64qt3-3.3.8-4.2mdv2007.1.x86_64.rpm\r\n 229bab28762c0d333a940d46926b3353 2007.1/x86_64/lib64qt3-devel-3.3.8-4.2mdv2007.1.x86_64.rpm\r\n aabb7fc73313b1770e039bd488524003 2007.1/x86_64/lib64qt3-mysql-3.3.8-4.2mdv2007.1.x86_64.rpm\r\n fedcc9dbcc41c5606e26e09af699d6b7 2007.1/x86_64/lib64qt3-odbc-3.3.8-4.2mdv2007.1.x86_64.rpm\r\n af4ec539b2ae95c7105612ebe9b81668 2007.1/x86_64/lib64qt3-psql-3.3.8-4.2mdv2007.1.x86_64.rpm\r\n b8be46a21e965b5d1457fc9c51cd5e1d 2007.1/x86_64/lib64qt3-sqlite-3.3.8-4.2mdv2007.1.x86_64.rpm\r\n 00afa524f662a5f72c1f4e14cea98168 2007.1/x86_64/lib64qt3-static-devel-3.3.8-4.2mdv2007.1.x86_64.rpm\r\n 86f709c31498fbe79d14028cdcab4698 2007.1/x86_64/lib64qt3support4-4.2.3-3.2mdv2007.1.x86_64.rpm\r\n 5abbebe7e2548a62812cc08b18aacc7b 2007.1/x86_64/lib64qt4-devel-4.2.3-3.2mdv2007.1.x86_64.rpm\r\n 8381f75b00e35e50914d0fd6598f57ab 2007.1/x86_64/lib64qtcore4-4.2.3-3.2mdv2007.1.x86_64.rpm\r\n 480aa853889a8780f7800ca569ab305e 2007.1/x86_64/lib64qtdbus4-4.2.3-3.2mdv2007.1.x86_64.rpm\r\n 885449f3b925287acc0c06251e418456 2007.1/x86_64/lib64qtdesigner1-4.2.3-3.2mdv2007.1.x86_64.rpm\r\n ce844fc42e1ea97186434167163a21e3 2007.1/x86_64/lib64qtgui4-4.2.3-3.2mdv2007.1.x86_64.rpm\r\n 0e999ed855a569634aa2167090a2d0d6 2007.1/x86_64/lib64qtnetwork4-4.2.3-3.2mdv2007.1.x86_64.rpm\r\n 0b3c99722ca0c8fa963f6203db28f89a 2007.1/x86_64/lib64qtopengl4-4.2.3-3.2mdv2007.1.x86_64.rpm\r\n 7e75bd1a1c02b08d58418039e1fef3f7 2007.1/x86_64/lib64qtsql4-4.2.3-3.2mdv2007.1.x86_64.rpm\r\n a1140be4fd6249a8c26b191326bde4ed 2007.1/x86_64/lib64qtsvg4-4.2.3-3.2mdv2007.1.x86_64.rpm\r\n 0fc91fc958e688fd01cbb4e1e426e3be 2007.1/x86_64/lib64qttest4-4.2.3-3.2mdv2007.1.x86_64.rpm\r\n d129baa5937780a8690c265f2b1bb5d6 2007.1/x86_64/lib64qtuitools4-4.2.3-3.2mdv2007.1.x86_64.rpm\r\n 2e2c78d1818474051be1a871994eef6d 2007.1/x86_64/lib64qtxml4-4.2.3-3.2mdv2007.1.x86_64.rpm\r\n 869dbe2d9eb49b40db34885e0fa69677 2007.1/x86_64/qt3-common-3.3.8-4.2mdv2007.1.x86_64.rpm\r\n 6ef70fde277e1a0c3195d38ab9a9bfea 2007.1/x86_64/qt3-doc-3.3.8-4.2mdv2007.1.x86_64.rpm\r\n 3466ebe267634c1eb8558f0eb8f95f52 2007.1/x86_64/qt3-example-3.3.8-4.2mdv2007.1.x86_64.rpm\r\n 86734adfcc1d81875de44289904ff3d4 2007.1/x86_64/qt3-tutorial-3.3.8-4.2mdv2007.1.x86_64.rpm\r\n 0c0022829fe93c7eea08c86f93b20dc0 2007.1/x86_64/qt4-accessibility-plugin-lib64-4.2.3-3.2mdv2007.1.x86_64.rpm\r\n f533b0269ca616ee8c4bbd0ff5ca3daa 2007.1/x86_64/qt4-assistant-4.2.3-3.2mdv2007.1.x86_64.rpm\r\n 558bbc30cca03773fc105955937c6fe2 2007.1/x86_64/qt4-codecs-plugin-lib64-4.2.3-3.2mdv2007.1.x86_64.rpm\r\n 13d696dc41dd53a8b258b5a3c74d7d54 2007.1/x86_64/qt4-common-4.2.3-3.2mdv2007.1.x86_64.rpm\r\n 4dab9fc859f7b7ef7397e9e3b2b5f93d 2007.1/x86_64/qt4-database-plugin-mysql-lib64-4.2.3-3.2mdv2007.1.x86_64.rpm\r\n bdc9766e21cb8905f0cde5fbdde2a5fa 2007.1/x86_64/qt4-database-plugin-odbc-lib64-4.2.3-3.2mdv2007.1.x86_64.rpm\r\n 3610ebb17437109e64d5ba1c096c1a56 2007.1/x86_64/qt4-database-plugin-pgsql-lib64-4.2.3-3.2mdv2007.1.x86_64.rpm\r\n 89b78ac3afda0fd89a2dd5963e6009e8 2007.1/x86_64/qt4-database-plugin-sqlite-lib64-4.2.3-3.2mdv2007.1.x86_64.rpm\r\n c5062be2251e53c7c68ffdd01118a94f 2007.1/x86_64/qt4-designer-4.2.3-3.2mdv2007.1.x86_64.rpm\r\n 597646101b38360473445fcc787429b6 2007.1/x86_64/qt4-doc-4.2.3-3.2mdv2007.1.x86_64.rpm\r\n e52fd9c83b17c9034af9cccb62da7054 2007.1/x86_64/qt4-examples-4.2.3-3.2mdv2007.1.x86_64.rpm\r\n 34ffa9a751d2d9d9a441a1445be2c618 2007.1/x86_64/qt4-linguist-4.2.3-3.2mdv2007.1.x86_64.rpm\r\n e63565e434cf212c1293a48c00ef62c2 2007.1/x86_64/qt4-qvfb-4.2.3-3.2mdv2007.1.x86_64.rpm\r\n 6487044a0d4e01b7f0e051271f2f845e 2007.1/x86_64/qt4-tutorial-4.2.3-3.2mdv2007.1.x86_64.rpm \r\n bcfa6d5ed6bbabf21cd79569389ccdc1 2007.1/SRPMS/qt3-3.3.8-4.2mdv2007.1.src.rpm\r\n 07b5ad7fdb8c33feaca0987e0da75a12 2007.1/SRPMS/qt4-4.2.3-3.2mdv2007.1.src.rpm\r\n\r\n Corporate 3.0:\r\n ab3d4fa7012e68ea089e3954b1d29057 corporate/3.0/i586/libqt3-3.2.3-19.11.C30mdk.i586.rpm\r\n 0da460a3aedc027cf7d85cb11387e189 corporate/3.0/i586/libqt3-devel-3.2.3-19.11.C30mdk.i586.rpm\r\n 05c0191c82246418dbe339810b4e5a87 corporate/3.0/i586/libqt3-mysql-3.2.3-19.11.C30mdk.i586.rpm\r\n 409c3fd6dd1ea1d671cb1e6f8556d6f6 corporate/3.0/i586/libqt3-odbc-3.2.3-19.11.C30mdk.i586.rpm\r\n a7da3211466d9fce9fb4dad905cb47e6 corporate/3.0/i586/libqt3-psql-3.2.3-19.11.C30mdk.i586.rpm\r\n ad24a056c6249ea0b2c5d55480ad21c0 corporate/3.0/i586/qt3-common-3.2.3-19.11.C30mdk.i586.rpm\r\n 2bcc13ebe3a2430dc57a45d3966c97a9 corporate/3.0/i586/qt3-example-3.2.3-19.11.C30mdk.i586.rpm \r\n c9ad9b617ace8e418b33206ab1928fd5 corporate/3.0/SRPMS/qt3-3.2.3-19.11.C30mdk.src.rpm\r\n\r\n Corporate 3.0/X86_64:\r\n 2309eccb99ad2bbd1287f632c4da4cff corporate/3.0/x86_64/lib64qt3-3.2.3-19.11.C30mdk.x86_64.rpm\r\n 76a5d45120baedf3a249ee6125db1362 corporate/3.0/x86_64/lib64qt3-devel-3.2.3-19.11.C30mdk.x86_64.rpm\r\n 21eedcaaea02bf4d479529743ba9363e corporate/3.0/x86_64/lib64qt3-mysql-3.2.3-19.11.C30mdk.x86_64.rpm\r\n e5a746056e695cad5142cc21767b190b corporate/3.0/x86_64/lib64qt3-odbc-3.2.3-19.11.C30mdk.x86_64.rpm\r\n d8f45a65adb82c2fbd71fe28ed33c41d corporate/3.0/x86_64/lib64qt3-psql-3.2.3-19.11.C30mdk.x86_64.rpm\r\n 899a874a7425e601e357a9b33e6e3c50 corporate/3.0/x86_64/qt3-common-3.2.3-19.11.C30mdk.x86_64.rpm\r\n d0cb1917cb377778d250e5d8aa6ed086 corporate/3.0/x86_64/qt3-example-3.2.3-19.11.C30mdk.x86_64.rpm \r\n c9ad9b617ace8e418b33206ab1928fd5 corporate/3.0/SRPMS/qt3-3.2.3-19.11.C30mdk.src.rpm\r\n\r\n Corporate 4.0:\r\n 4e3d7b8fc0bf720e28c96cf39b0cb1df corporate/4.0/i586/libdesignercore1-3.3.6-1.5.20060mlcs4.i586.rpm\r\n 17ad129e736770cd8350b4bb83e423d6 corporate/4.0/i586/libeditor1-3.3.6-1.5.20060mlcs4.i586.rpm\r\n 7dc8125946cba9aa8bfd47bef9db4374 corporate/4.0/i586/libqassistantclient1-3.3.6-1.5.20060mlcs4.i586.rpm\r\n 5a6d125036228a10336decf4c755d755 corporate/4.0/i586/libqt3-3.3.6-1.5.20060mlcs4.i586.rpm\r\n 54212f889cb114e53964f1b476eb6c80 corporate/4.0/i586/libqt3-devel-3.3.6-1.5.20060mlcs4.i586.rpm\r\n 021f42c1e1bba5c12c95370baecb0ffd corporate/4.0/i586/libqt3-mysql-3.3.6-1.5.20060mlcs4.i586.rpm\r\n 069cc572e60d8affbe80c6174c37e401 corporate/4.0/i586/libqt3-odbc-3.3.6-1.5.20060mlcs4.i586.rpm\r\n cf03b86fc0b6701d92fe65ac603c1122 corporate/4.0/i586/libqt3-psql-3.3.6-1.5.20060mlcs4.i586.rpm\r\n 66e62782347426c3aef4ce5be5a0ec95 corporate/4.0/i586/libqt3-sqlite-3.3.6-1.5.20060mlcs4.i586.rpm\r\n 740e510668a226e8879541995787361a corporate/4.0/i586/libqt3-static-devel-3.3.6-1.5.20060mlcs4.i586.rpm\r\n f4cf85e296a1d78771810466e3b74af7 corporate/4.0/i586/qt3-common-3.3.6-1.5.20060mlcs4.i586.rpm\r\n a3436d1ad62b9ab09baec6d388c3a0ff corporate/4.0/i586/qt3-doc-3.3.6-1.5.20060mlcs4.i586.rpm\r\n bb3ece78dcf8fec1c5c6dad3a42904d0 corporate/4.0/i586/qt3-example-3.3.6-1.5.20060mlcs4.i586.rpm\r\n 010280610836458505d215c93d9a3d56 corporate/4.0/i586/qt3-tutorial-3.3.6-1.5.20060mlcs4.i586.rpm \r\n da529ce13204a9435463a5604de00873 corporate/4.0/SRPMS/qt3-3.3.6-1.5.20060mlcs4.src.rpm\r\n\r\n Corporate 4.0/X86_64:\r\n 198cb2d179cc1ae2ba856a608662fdc1 corporate/4.0/x86_64/lib64designercore1-3.3.6-1.5.20060mlcs4.x86_64.rpm\r\n 2cba56f2f6db341a1f30cb8d4fcd3017 corporate/4.0/x86_64/lib64editor1-3.3.6-1.5.20060mlcs4.x86_64.rpm\r\n 14b29965d43852b124c349873283c1fb corporate/4.0/x86_64/lib64qassistantclient1-3.3.6-1.5.20060mlcs4.x86_64.rpm\r\n eef2c89f765d97a9103d23a66ed0676c corporate/4.0/x86_64/lib64qt3-3.3.6-1.5.20060mlcs4.x86_64.rpm\r\n d5f0ff9ada5158f28ff002ba4e121bdc corporate/4.0/x86_64/lib64qt3-devel-3.3.6-1.5.20060mlcs4.x86_64.rpm\r\n 696716a959685651af0fd00b76ac407d corporate/4.0/x86_64/lib64qt3-mysql-3.3.6-1.5.20060mlcs4.x86_64.rpm\r\n 0322c0fcdb4f77bc40e9bcc2019d9576 corporate/4.0/x86_64/lib64qt3-odbc-3.3.6-1.5.20060mlcs4.x86_64.rpm\r\n 0cb9f0b436f86a1d9845bf4cfbbf0ac1 corporate/4.0/x86_64/lib64qt3-psql-3.3.6-1.5.20060mlcs4.x86_64.rpm\r\n 63ac4ced3ca9f3af6ce4907155e69df1 corporate/4.0/x86_64/lib64qt3-sqlite-3.3.6-1.5.20060mlcs4.x86_64.rpm\r\n 669ca07eacd4d45071c30151d3ee8495 corporate/4.0/x86_64/lib64qt3-static-devel-3.3.6-1.5.20060mlcs4.x86_64.rpm\r\n be917d2d1a9dde06ab45e581986b4ff2 corporate/4.0/x86_64/qt3-common-3.3.6-1.5.20060mlcs4.x86_64.rpm\r\n 5dd50534b809a164205ab4204eb3abb3 corporate/4.0/x86_64/qt3-doc-3.3.6-1.5.20060mlcs4.x86_64.rpm\r\n db94f741a2749dcc25476d6048a8c747 corporate/4.0/x86_64/qt3-example-3.3.6-1.5.20060mlcs4.x86_64.rpm\r\n a0419eadb7019f80fbbeeac110c990bd corporate/4.0/x86_64/qt3-tutorial-3.3.6-1.5.20060mlcs4.x86_64.rpm \r\n da529ce13204a9435463a5604de00873 corporate/4.0/SRPMS/qt3-3.3.6-1.5.20060mlcs4.src.rpm\r\n _______________________________________________________________________\r\n\r\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\r\n of md5 checksums and GPG signatures is performed automatically for you.\r\n\r\n All packages are signed by Mandriva for security. You can obtain the\r\n GPG public key of the Mandriva Security Team by executing:\r\n\r\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\r\n\r\n You can view other update advisories for Mandriva Linux at:\r\n\r\n http://www.mandriva.com/security/advisories\r\n\r\n If you want to report vulnerabilities, please contact\r\n\r\n security_(at)_mandriva.com\r\n _______________________________________________________________________\r\n\r\n Type Bits/KeyID Date User ID\r\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\r\n <security*mandriva.com>\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1.4.7 (GNU/Linux)\r\n\r\niD8DBQFG6fzCmqjQ0CJFipgRAj8jAJ9H6FPAni81t3NwurBMxqJDyb7kOgCeOSNM\r\nLpAHtByYMFpiX7owfMCwzVI=\r\n=aOUN\r\n-----END PGP SIGNATURE-----\r\n\r\n_______________________________________________\r\nFull-Disclosure - We believe in it.\r\nCharter: http://lists.grok.org.uk/full-disclosure-charter.html\r\nHosted and sponsored by Secunia - http://secunia.com/", "edition": 1, "cvss3": {}, "published": "2007-09-14T00:00:00", "title": "[Full-disclosure] [ MDKSA-2007:183 ] - Updated qt3/qt4 packages fix vulnerability", "type": "securityvulns", "bulletinFamily": "software", "cvss2": {}, "cvelist": ["CVE-2007-4137"], "modified": "2007-09-14T00:00:00", "id": "SECURITYVULNS:DOC:18000", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:18000", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-08-31T11:09:27", "description": "Buffer overflow on Unicode strings parsing.", "edition": 1, "cvss3": {}, "published": "2007-09-14T00:00:00", "title": "Qt library buffer overflow", "type": "securityvulns", "bulletinFamily": "software", "cvss2": {}, "cvelist": ["CVE-2007-4137"], "modified": "2007-09-14T00:00:00", "id": "SECURITYVULNS:VULN:8153", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:8153", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "oraclelinux": [{"lastseen": "2019-05-29T18:39:24", "description": " [3.3.6-23]\n - Resolves: #277011, Qt UTF8 improper character expansion, CVE-2007-0242\n - Resolves: #269141, Qt off by one buffer overflow, CVE-2007-413 ", "cvss3": {}, "published": "2007-09-13T00:00:00", "type": "oraclelinux", "title": "Important: qt security update ", "bulletinFamily": "unix", "cvss2": {}, "cvelist": ["CVE-2007-0242", "CVE-2007-4137"], "modified": "2007-09-13T00:00:00", "id": "ELSA-2007-0883", "href": "http://linux.oracle.com/errata/ELSA-2007-0883.html", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "centos": [{"lastseen": "2022-02-27T15:53:54", "description": "**CentOS Errata and Security Advisory** CESA-2007:0883\n\n\nQt is a software toolkit that simplifies the task of writing and\r\nmaintaining GUI (Graphical User Interface) applications for the X Window\r\nSystem.\r\n\r\nA flaw was found in the way Qt expanded certain UTF8 characters. It was\r\npossible to prevent a Qt-based application from properly sanitizing user\r\nsupplied input. This could, for example, result in a cross-site scripting\r\nattack against the Konqueror web browser. (CVE-2007-0242)\r\n\r\nA buffer overflow flaw was found in the way Qt expanded malformed Unicode\r\nstrings. If an application linked against Qt parsed a malicious Unicode\r\nstring, it could lead to a denial of service or possibly allow the\r\nexecution of arbitrary code. (CVE-2007-4137)\r\n\r\nUsers of Qt should upgrade to these updated packages, which contain a\r\nbackported patch to correct these issues.\n\n**Merged security bulletin from advisories:**\nhttps://lists.centos.org/pipermail/centos-announce/2007-September/051109.html\nhttps://lists.centos.org/pipermail/centos-announce/2007-September/051110.html\nhttps://lists.centos.org/pipermail/centos-announce/2007-September/051111.html\nhttps://lists.centos.org/pipermail/centos-announce/2007-September/051112.html\nhttps://lists.centos.org/pipermail/centos-announce/2007-September/051113.html\nhttps://lists.centos.org/pipermail/centos-announce/2007-September/051114.html\nhttps://lists.centos.org/pipermail/centos-announce/2007-September/051118.html\nhttps://lists.centos.org/pipermail/centos-announce/2007-September/051119.html\nhttps://lists.centos.org/pipermail/centos-announce/2007-September/051154.html\nhttps://lists.centos.org/pipermail/centos-announce/2007-September/051155.html\n\n**Affected packages:**\nqt\nqt-MySQL\nqt-ODBC\nqt-PostgreSQL\nqt-config\nqt-designer\nqt-devel\nqt-devel-docs\n\n**Upstream details at:**\nhttps://access.redhat.com/errata/RHSA-2007:0883", "cvss3": {}, "published": "2007-09-13T18:50:19", "type": "centos", "title": "qt security update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": true, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2007-0242", "CVE-2007-4137"], "modified": "2007-09-25T10:22:18", "id": "CESA-2007:0883", "href": "https://lists.centos.org/pipermail/centos-announce/2007-September/051109.html", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-02-27T15:53:55", "description": "**CentOS Errata and Security Advisory** CESA-2007:0883-01\n\n\nQt is a software toolkit that simplifies the task of writing and\r\nmaintaining GUI (Graphical User Interface) applications for the X Window\r\nSystem.\r\n\r\nA flaw was found in the way Qt expanded certain UTF8 characters. It was\r\npossible to prevent a Qt-based application from properly sanitizing user\r\nsupplied input. This could, for example, result in a cross-site scripting\r\nattack against the Konqueror web browser. (CVE-2007-0242)\r\n\r\nA buffer overflow flaw was found in the way Qt expanded malformed Unicode\r\nstrings. If an application linked against Qt parsed a malicious Unicode\r\nstring, it could lead to a denial of service or possibly allow the\r\nexecution of arbitrary code. (CVE-2007-4137)\r\n\r\nUsers of Qt should upgrade to these updated packages, which contain a\r\nbackported patch to correct these issues.\n\n**Merged security bulletin from advisories:**\nhttps://lists.centos.org/pipermail/centos-announce/2007-September/051117.html\n\n**Affected packages:**\nqt\nqt-Xt\nqt-designer\nqt-devel\nqt-static\n\n", "cvss3": {}, "published": "2007-09-14T01:30:43", "type": "centos", "title": "qt security update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": true, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2007-0242", "CVE-2007-4137"], "modified": "2007-09-14T01:30:43", "id": "CESA-2007:0883-01", "href": "https://lists.centos.org/pipermail/centos-announce/2007-September/051117.html", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "redhat": [{"lastseen": "2021-10-19T20:37:05", "description": "Qt is a software toolkit that simplifies the task of writing and\r\nmaintaining GUI (Graphical User Interface) applications for the X Window\r\nSystem.\r\n\r\nA flaw was found in the way Qt expanded certain UTF8 characters. It was\r\npossible to prevent a Qt-based application from properly sanitizing user\r\nsupplied input. This could, for example, result in a cross-site scripting\r\nattack against the Konqueror web browser. (CVE-2007-0242)\r\n\r\nA buffer overflow flaw was found in the way Qt expanded malformed Unicode\r\nstrings. If an application linked against Qt parsed a malicious Unicode\r\nstring, it could lead to a denial of service or possibly allow the\r\nexecution of arbitrary code. (CVE-2007-4137)\r\n\r\nUsers of Qt should upgrade to these updated packages, which contain a\r\nbackported patch to correct these issues.", "cvss3": {}, "published": "2007-09-13T00:00:00", "type": "redhat", "title": "(RHSA-2007:0883) Important: qt security update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": true, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2007-0242", "CVE-2007-4137"], "modified": "2019-03-22T19:42:35", "id": "RHSA-2007:0883", "href": "https://access.redhat.com/errata/RHSA-2007:0883", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "debian": [{"lastseen": "2021-10-22T01:50:03", "description": "- ------------------------------------------------------------------------\nDebian Security Advisory DSA-1426-1 security@debian.org\nhttp://www.debian.org/security/ Moritz Muehlenhoff\nDecember 08, 2007 http://www.debian.org/security/faq\n- ------------------------------------------------------------------------\n\nPackage : qt-x11-free\nVulnerability : several\nProblem type : local(remote)\nDebian-specific: no\nCVE Id(s) : CVE-2007-3388 CVE-2007-4137\n\nSeveral local/remote vulnerabilities have been discovered in the Qt GUI\nLibrary. The Common Vulnerabilities and Exposures project identifies the\nfollowing problems:\n\nCVE-2007-3388\n\n Tim Brown and Dirk M\u00fcller discovered several format string\n vulnerabilities in the handling of error messages, which might lead\n to the execution of arbitrary code.\n\nCVE-2007-4137\n\n Dirk M\u00fcller discovered an off-by-one buffer overflow in the Unicode\n handling, which might lead to the execution of arbitrary code.\n\nFor the old stable distribution (sarge), these problems have been fixed\nin version 3:3.3.4-3sarge3. Packages for m68k will be provided later.\n\nFor the stable distribution (etch), these problems have been fixed in\nversion 3:3.3.7-4etch1.\n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 3:3.3.7-8.\n\nWe recommend that you upgrade your qt-x11-free packages.\n\nUpgrade instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file.\n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration.\n\n\nDebian 3.1 (oldstable)\n- ----------------------\n\nOldstable updates are available for alpha, amd64, arm, hppa, i386, ia64, m68k, mips, mipsel, powerpc, s390 and sparc.\n\nSource archives:\n\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt-x11-free_3.3.4-3sarge3.diff.gz\n Size/MD5 checksum: 58232 376e36b08cc0b6af3aa1a9aebae8aef5\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt-x11-free_3.3.4-3sarge3.dsc\n Size/MD5 checksum: 1847 e7bba0a0fbc7b17e7be3e0025b00ad1a\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt-x11-free_3.3.4.orig.tar.gz\n Size/MD5 checksum: 17422638 9b327962af5a1799fd31b7a576948ad5\n\nArchitecture independent packages:\n\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-i18n_3.3.4-3sarge3_all.deb\n Size/MD5 checksum: 92518 862dcc41cf67e7fc7a4549cf084a845c\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-doc_3.3.4-3sarge3_all.deb\n Size/MD5 checksum: 5425086 0a6c564358c2fcec3e4d473de6f158be\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-examples_3.3.4-3sarge3_all.deb\n Size/MD5 checksum: 1553522 d981054a195c20a951709ebaf223f3c1\n\nalpha architecture (DEC Alpha)\n\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-mt-mysql_3.3.4-3sarge3_alpha.deb\n Size/MD5 checksum: 48860 c779e5a5bc83a572fb09b484ae20e120\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-psql_3.3.4-3sarge3_alpha.deb\n Size/MD5 checksum: 55186 dea06e05070c1ef427e9f5062f3127fe\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-dev-tools_3.3.4-3sarge3_alpha.deb\n Size/MD5 checksum: 1543032 cc7e7a76fdf3a10cb1e0adbf1f151c1f\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-compat-headers_3.3.4-3sarge3_alpha.deb\n Size/MD5 checksum: 34770 63e0b1e49dd03e9987161af75ed81f7a\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-dev-tools-compat_3.3.4-3sarge3_alpha.deb\n Size/MD5 checksum: 72946 e8f589672e0267d2004e685069c1f857\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-qtconfig_3.3.4-3sarge3_alpha.deb\n Size/MD5 checksum: 102560 b0d128277647b7371150286a08f875d9\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt-dev_3.3.4-3sarge3_alpha.deb\n Size/MD5 checksum: 47444 20d5bfe8de37a7ba92add1582fe42b0c\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-mysql_3.3.4-3sarge3_alpha.deb\n Size/MD5 checksum: 48982 80820b57242d6d7e5e0e3e7d57733fe3\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102_3.3.4-3sarge3_alpha.deb\n Size/MD5 checksum: 3377526 467635e9803fcd6dea6f8cec4a6618e5\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-mt-sqlite_3.3.4-3sarge3_alpha.deb\n Size/MD5 checksum: 236290 46793e8f2c1c266f12053e0b5057bf1e\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-mt-psql_3.3.4-3sarge3_alpha.deb\n Size/MD5 checksum: 55062 5a815bbaad20be4e430c6dfb79788bbd\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-headers_3.3.4-3sarge3_alpha.deb\n Size/MD5 checksum: 360504 8dc2243a292405b7018069e13cca3b68\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-designer_3.3.4-3sarge3_alpha.deb\n Size/MD5 checksum: 4312744 c97d54c4e134827974ec5ab5d1a4504b\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-mt_3.3.4-3sarge3_alpha.deb\n Size/MD5 checksum: 3498856 e20f9a12b4abf49e86d3fbe95e28a6fb\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-mt-odbc_3.3.4-3sarge3_alpha.deb\n Size/MD5 checksum: 68752 4017f7f062d633411c1f0bb31849d5b9\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-odbc_3.3.4-3sarge3_alpha.deb\n Size/MD5 checksum: 68888 641b959225b5fa023b42a7399f3c424d\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-dev-tools-embedded_3.3.4-3sarge3_alpha.deb\n Size/MD5 checksum: 289426 a7aa78d21fcde1e6ef02a4a5d89a694d\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-assistant_3.3.4-3sarge3_alpha.deb\n Size/MD5 checksum: 265010 c7b945eba1fad24964b2ca25d6969ae5\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-apps-dev_3.3.4-3sarge3_alpha.deb\n Size/MD5 checksum: 2876140 89f6990c4e6e9c24d8b90efc51569abc\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-linguist_3.3.4-3sarge3_alpha.deb\n Size/MD5 checksum: 362272 34744b6c3d7eb49849b121ea186ae149\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-sqlite_3.3.4-3sarge3_alpha.deb\n Size/MD5 checksum: 236400 e238622a304ceca063ab681f2007ef6c\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-dev_3.3.4-3sarge3_alpha.deb\n Size/MD5 checksum: 40812 9ec1142b183c9f18274a00bc0426cbe9\n\namd64 architecture (AMD x86_64 (AMD64))\n\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-dev-tools-embedded_3.3.4-3sarge3_amd64.deb\n Size/MD5 checksum: 285776 dc6f826ad68064d5ff6cc51169ea5661\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-designer_3.3.4-3sarge3_amd64.deb\n Size/MD5 checksum: 4091780 6bfe5ff8dbd8087c221e618df2ed381f\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-headers_3.3.4-3sarge3_amd64.deb\n Size/MD5 checksum: 350194 bede3d2b1de94b7f971788263109842c\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-mt-mysql_3.3.4-3sarge3_amd64.deb\n Size/MD5 checksum: 47286 95310072d46c7ce61f219989c367f1e0\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-mysql_3.3.4-3sarge3_amd64.deb\n Size/MD5 checksum: 47394 ce56b450157dd4d453204cb08d5a07da\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-mt-psql_3.3.4-3sarge3_amd64.deb\n Size/MD5 checksum: 53618 bdf0521ef106da3969a9b8f8251aac65\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-dev-tools_3.3.4-3sarge3_amd64.deb\n Size/MD5 checksum: 1245952 6ae07147d82d50bec0a603529252b3bd\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-qtconfig_3.3.4-3sarge3_amd64.deb\n Size/MD5 checksum: 95108 97cb74bb5fde3402e8b20b50b2f4dd1f\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-mt-odbc_3.3.4-3sarge3_amd64.deb\n Size/MD5 checksum: 65424 e2ba278f3f943de73b38d60a34bba055\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-mt-sqlite_3.3.4-3sarge3_amd64.deb\n Size/MD5 checksum: 217664 aacd1a7183ab779cf53313f62e8a956e\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-dev-tools-compat_3.3.4-3sarge3_amd64.deb\n Size/MD5 checksum: 67802 fdc8bafba232ca7e781fcae40b0f6560\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-mt_3.3.4-3sarge3_amd64.deb\n Size/MD5 checksum: 3115624 0548e1333e73ba156f2600615c13c7c5\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-linguist_3.3.4-3sarge3_amd64.deb\n Size/MD5 checksum: 342312 d56e7186bcb4391a78c2a325b3863d86\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-compat-headers_3.3.4-3sarge3_amd64.deb\n Size/MD5 checksum: 34364 c1814dc6bea0bfa935b527e2f03a3c2c\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-odbc_3.3.4-3sarge3_amd64.deb\n Size/MD5 checksum: 65552 f8aec61f8c3baf3fd91ed41ccb4da06e\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-sqlite_3.3.4-3sarge3_amd64.deb\n Size/MD5 checksum: 217788 7f7d87ac8aa63fd8f898c89a5389f854\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-psql_3.3.4-3sarge3_amd64.deb\n Size/MD5 checksum: 53738 0d94210da78277d9933604f98029c980\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-assistant_3.3.4-3sarge3_amd64.deb\n Size/MD5 checksum: 247802 1c82240cc343c5d2bd7cc2a7c8bd6950\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-apps-dev_3.3.4-3sarge3_amd64.deb\n Size/MD5 checksum: 2115508 7366d3d7e20a41bc39a9179d3cab3263\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-dev_3.3.4-3sarge3_amd64.deb\n Size/MD5 checksum: 40610 3e172d6882b4ec197f267d47e604e5bc\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt-dev_3.3.4-3sarge3_amd64.deb\n Size/MD5 checksum: 46560 52a07798ab026e625678d0044ec39434\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102_3.3.4-3sarge3_amd64.deb\n Size/MD5 checksum: 3001248 79f581e38c8d460f32fa65eb834432b9\n\narm architecture (ARM)\n\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-mt-mysql_3.3.4-3sarge3_arm.deb\n Size/MD5 checksum: 45132 0060433c3a78ab8073f08618b9b55e17\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt-dev_3.3.4-3sarge3_arm.deb\n Size/MD5 checksum: 47442 13812bd344c6dd274fdbd92df87e933d\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-dev-tools-embedded_3.3.4-3sarge3_arm.deb\n Size/MD5 checksum: 276056 37eb751dd3ae65f6a0d67665466d5d0b\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102_3.3.4-3sarge3_arm.deb\n Size/MD5 checksum: 2713514 fbc042dac6f658e46bd1cf9fa448ed71\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-mt_3.3.4-3sarge3_arm.deb\n Size/MD5 checksum: 2813648 9b27f47e81423762c76a246bd223bf1b\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-compat-headers_3.3.4-3sarge3_arm.deb\n Size/MD5 checksum: 34842 c7287eff577518a0f0573137c4d22574\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-designer_3.3.4-3sarge3_arm.deb\n Size/MD5 checksum: 3999476 2d4988006259f7723a86fd694f901315\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-qtconfig_3.3.4-3sarge3_arm.deb\n Size/MD5 checksum: 86546 78c6b3fd460853d20adb37627ce09171\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-psql_3.3.4-3sarge3_arm.deb\n Size/MD5 checksum: 50638 8d86ae6d7cbddffc9a4cb1073f14c709\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-mt-sqlite_3.3.4-3sarge3_arm.deb\n Size/MD5 checksum: 200442 55c5870f2c8a1458013703a0eebe4c81\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-headers_3.3.4-3sarge3_arm.deb\n Size/MD5 checksum: 361688 0ece13ce568a996b1bae8545e52fc25c\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-mt-psql_3.3.4-3sarge3_arm.deb\n Size/MD5 checksum: 50506 21b1446ed6588c05226c8a084879a00f\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-dev-tools_3.3.4-3sarge3_arm.deb\n Size/MD5 checksum: 1290080 931220f80a15b018e275ba231ef181ea\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-sqlite_3.3.4-3sarge3_arm.deb\n Size/MD5 checksum: 200620 72716785cf44dd3e25b9f4556297e25c\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-dev-tools-compat_3.3.4-3sarge3_arm.deb\n Size/MD5 checksum: 63262 a789b8fc1af162733bc346ff9455f3be\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-mt-odbc_3.3.4-3sarge3_arm.deb\n Size/MD5 checksum: 61694 0b242760cd5512a935fd8c7ff3d50c97\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-odbc_3.3.4-3sarge3_arm.deb\n Size/MD5 checksum: 61838 2134b2953b35278fb2ebda8652d50058\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-dev_3.3.4-3sarge3_arm.deb\n Size/MD5 checksum: 40966 739ebe2ce0dc43a0152d33445165e714\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-assistant_3.3.4-3sarge3_arm.deb\n Size/MD5 checksum: 231240 de9ec11f6d422e2862b7af6026142857\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-apps-dev_3.3.4-3sarge3_arm.deb\n Size/MD5 checksum: 2075796 fb62ab4409ac7682be5baa86e1ab532a\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-linguist_3.3.4-3sarge3_arm.deb\n Size/MD5 checksum: 330776 fd3e9dd0c4b41687b5af78c38eadbb0a\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-mysql_3.3.4-3sarge3_arm.deb\n Size/MD5 checksum: 45250 f647ecb82c3edb793c41fe23e1812d2e\n\nhppa architecture (HP PA RISC)\n\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-compat-headers_3.3.4-3sarge3_hppa.deb\n Size/MD5 checksum: 34418 c0789cadf1b197bf13fd9b26238c12f6\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-linguist_3.3.4-3sarge3_hppa.deb\n Size/MD5 checksum: 345588 a0e90ab57b0b2a229d8b1c34a0ce0b61\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-mysql_3.3.4-3sarge3_hppa.deb\n Size/MD5 checksum: 48276 92b96d5fa21134f9010c626575a6ee31\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-psql_3.3.4-3sarge3_hppa.deb\n Size/MD5 checksum: 54896 8b20d5bdaf950674cd3d10323f658422\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-sqlite_3.3.4-3sarge3_hppa.deb\n Size/MD5 checksum: 235418 23a365399f259c2d3a6e5615989e90ad\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-dev-tools-embedded_3.3.4-3sarge3_hppa.deb\n Size/MD5 checksum: 283774 ab989df8677582466909eb1544dce651\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt-dev_3.3.4-3sarge3_hppa.deb\n Size/MD5 checksum: 46576 eb394b36b75c83cd2c83b4ea71778657\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102_3.3.4-3sarge3_hppa.deb\n Size/MD5 checksum: 3306194 76b37ee5740b99f89a50252823b32eb9\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-mt-sqlite_3.3.4-3sarge3_hppa.deb\n Size/MD5 checksum: 235296 cb83c19038ca11c1b9655aaf12bb1af2\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-mt-mysql_3.3.4-3sarge3_hppa.deb\n Size/MD5 checksum: 48140 683bd6e29a2ba097daa767933b860915\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-dev-tools_3.3.4-3sarge3_hppa.deb\n Size/MD5 checksum: 1454648 bd589292953bb09a5219007697d6b4ad\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-mt_3.3.4-3sarge3_hppa.deb\n Size/MD5 checksum: 3428484 7d9a1fdef0099713815982c3f8696db4\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-odbc_3.3.4-3sarge3_hppa.deb\n Size/MD5 checksum: 67662 0506700553274aad8d6b9310c5808e43\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-mt-odbc_3.3.4-3sarge3_hppa.deb\n Size/MD5 checksum: 67544 586372d919f03c138339f4128ebebdc0\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-headers_3.3.4-3sarge3_hppa.deb\n Size/MD5 checksum: 350214 27d4786a1f8d5b955794d919b5ad736b\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-qtconfig_3.3.4-3sarge3_hppa.deb\n Size/MD5 checksum: 96936 ce64f23977426282299d73ea18c16b13\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-designer_3.3.4-3sarge3_hppa.deb\n Size/MD5 checksum: 4273300 73d32f52c10794601346fb8deb0cdc5e\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-dev-tools-compat_3.3.4-3sarge3_hppa.deb\n Size/MD5 checksum: 68138 e25ca2291bbddaf254fca153304e1291\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-assistant_3.3.4-3sarge3_hppa.deb\n Size/MD5 checksum: 253172 e34cfd61f0dfef1e9ceb0cb85a35dd5b\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-apps-dev_3.3.4-3sarge3_hppa.deb\n Size/MD5 checksum: 2292060 46f653f0fc6293fdadb3b4f0f47cc208\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-mt-psql_3.3.4-3sarge3_hppa.deb\n Size/MD5 checksum: 54776 978efdef6c96b87f5e124797d3b8697c\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-dev_3.3.4-3sarge3_hppa.deb\n Size/MD5 checksum: 40616 c1a070270cfb1e2e6bb1bd03d207e4e6\n\ni386 architecture (Intel ia32)\n\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-assistant_3.3.4-3sarge3_i386.deb\n Size/MD5 checksum: 238020 98de00b2005b35ea93f933b80245152b\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-apps-dev_3.3.4-3sarge3_i386.deb\n Size/MD5 checksum: 2005348 c9e42a338d7525c58da46d7b493db713\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102_3.3.4-3sarge3_i386.deb\n Size/MD5 checksum: 2927916 b4e8e75df3c79e4935604ca876fd3f51\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-mt-odbc_3.3.4-3sarge3_i386.deb\n Size/MD5 checksum: 64140 d49c1a26fb2b20e5aafe22210ecfad76\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-designer_3.3.4-3sarge3_i386.deb\n Size/MD5 checksum: 4072442 f7a6b6b85895f1413f07b698ec2a9819\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-mt-mysql_3.3.4-3sarge3_i386.deb\n Size/MD5 checksum: 46386 2ce50c87d87453e4f8d5b8214b34a6ce\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt-dev_3.3.4-3sarge3_i386.deb\n Size/MD5 checksum: 46542 e91d19fd3918f629041d5a2e1441c0bb\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-linguist_3.3.4-3sarge3_i386.deb\n Size/MD5 checksum: 335808 a51140841b814ff19e1b98c0f800f55f\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-dev-tools-embedded_3.3.4-3sarge3_i386.deb\n Size/MD5 checksum: 283224 233eb6bc708b5c5f589799e346cb3757\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-mysql_3.3.4-3sarge3_i386.deb\n Size/MD5 checksum: 46500 4c8dca5539a462623d042c38a1aa5c80\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-mt_3.3.4-3sarge3_i386.deb\n Size/MD5 checksum: 3044566 3b23629f517d4654db66c294beeb7c7c\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-dev_3.3.4-3sarge3_i386.deb\n Size/MD5 checksum: 40602 6dce661e25c0ca50ae798dcc93ee0f10\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-mt-ibase_3.3.4-3sarge3_i386.deb\n Size/MD5 checksum: 55064 9c723fa7ce0085271307085a659d6c94\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-psql_3.3.4-3sarge3_i386.deb\n Size/MD5 checksum: 53162 469212ca53edc1f6939e84456ab1f90a\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-dev-tools_3.3.4-3sarge3_i386.deb\n Size/MD5 checksum: 1199706 1eb43d902d9dad36d2b5d29c005c5d11\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-mt-sqlite_3.3.4-3sarge3_i386.deb\n Size/MD5 checksum: 213378 f10d1c83945022ede65d1b7fe20f10bb\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-headers_3.3.4-3sarge3_i386.deb\n Size/MD5 checksum: 350190 9e790fc71e39b458011acb25a76a5736\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-sqlite_3.3.4-3sarge3_i386.deb\n Size/MD5 checksum: 213510 18ab366aa69c9641e7b2dd89c54bf5d3\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-odbc_3.3.4-3sarge3_i386.deb\n Size/MD5 checksum: 64254 0ff49f04acb796fd42edf7867321af17\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-compat-headers_3.3.4-3sarge3_i386.deb\n Size/MD5 checksum: 78286 6e09d3141c81abfa8793333e457c00d0\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-dev-tools-compat_3.3.4-3sarge3_i386.deb\n Size/MD5 checksum: 64422 0596f181bb2a1bda7ff5336697bba13f\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-qtconfig_3.3.4-3sarge3_i386.deb\n Size/MD5 checksum: 92054 860610b972014a3616f380bd96a06a3e\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-mt-psql_3.3.4-3sarge3_i386.deb\n Size/MD5 checksum: 53024 bfc4557d19683d537eeb1efc4b49236f\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-ibase_3.3.4-3sarge3_i386.deb\n Size/MD5 checksum: 55194 5c8b9fbd3bb8dac3fec062b72527698e\n\nia64 architecture (Intel ia64)\n\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-designer_3.3.4-3sarge3_ia64.deb\n Size/MD5 checksum: 4469470 d69ed29ad2a283acfefaeaf0fdd3d40f\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-dev-tools-compat_3.3.4-3sarge3_ia64.deb\n Size/MD5 checksum: 78232 a06edca53c82eff5f94b8c10aae56f6f\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-mysql_3.3.4-3sarge3_ia64.deb\n Size/MD5 checksum: 51734 e17269d481bd0033b4a566858cd2531b\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-psql_3.3.4-3sarge3_ia64.deb\n Size/MD5 checksum: 59766 8fae969d1ee25a766ea0d4637bcab28f\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-sqlite_3.3.4-3sarge3_ia64.deb\n Size/MD5 checksum: 294196 53c6edea5631416caed72bbfa3966592\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-mt-psql_3.3.4-3sarge3_ia64.deb\n Size/MD5 checksum: 59620 fa7bda765ac515790876a59ad1a9ba09\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt-dev_3.3.4-3sarge3_ia64.deb\n Size/MD5 checksum: 46554 89e9ebb1ff5ca3c5b9fdae704f7c08a2\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102_3.3.4-3sarge3_ia64.deb\n Size/MD5 checksum: 4033080 ce5f14125fd2e6c576ad060998374247\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-qtconfig_3.3.4-3sarge3_ia64.deb\n Size/MD5 checksum: 112376 a8a89679b47ba6bfb5c075240c161a24\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-dev_3.3.4-3sarge3_ia64.deb\n Size/MD5 checksum: 40606 dc2eb3ff40b217d84180deacaf001057\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-linguist_3.3.4-3sarge3_ia64.deb\n Size/MD5 checksum: 379670 921e82f16918a28365344f9d924e8d49\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-mt-odbc_3.3.4-3sarge3_ia64.deb\n Size/MD5 checksum: 75296 c8bcc4cd4014dbc3c19a6f557f49f2be\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-dev-tools_3.3.4-3sarge3_ia64.deb\n Size/MD5 checksum: 1649974 7b5dcd51cc3fd695b941386a03d9ab36\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-mt-mysql_3.3.4-3sarge3_ia64.deb\n Size/MD5 checksum: 51640 ca6cc94b9476c98c7c45d42f83d7f11e\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-dev-tools-embedded_3.3.4-3sarge3_ia64.deb\n Size/MD5 checksum: 298920 dc983927da11a1d419b9320ca879c08c\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-mt-sqlite_3.3.4-3sarge3_ia64.deb\n Size/MD5 checksum: 294014 85b5e02f8575379f5b42a5f1db344b0a\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-compat-headers_3.3.4-3sarge3_ia64.deb\n Size/MD5 checksum: 34372 8508f0667baef0a5ac5ea5b7f3e9b71b\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-odbc_3.3.4-3sarge3_ia64.deb\n Size/MD5 checksum: 75414 83b2b58b54457bb9e2ecfaf91ca2075c\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-headers_3.3.4-3sarge3_ia64.deb\n Size/MD5 checksum: 350192 5e7c70769a0f87ac0beb7177d3571753\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-apps-dev_3.3.4-3sarge3_ia64.deb\n Size/MD5 checksum: 2747248 d6071e2204ae5d8aae192a180bb422e8\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-mt_3.3.4-3sarge3_ia64.deb\n Size/MD5 checksum: 4181158 b4003327548d7a273b9f205b4a5a57a7\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-assistant_3.3.4-3sarge3_ia64.deb\n Size/MD5 checksum: 286722 db0eb785260d1762b685b9c76ed9b49d\n\nmips architecture (MIPS (Big Endian))\n\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-qtconfig_3.3.4-3sarge3_mips.deb\n Size/MD5 checksum: 89012 18bba31e5012eb7537a1adc7b2d15711\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-linguist_3.3.4-3sarge3_mips.deb\n Size/MD5 checksum: 337368 fc145b332a7d477360af6478424c7a15\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-mt-sqlite_3.3.4-3sarge3_mips.deb\n Size/MD5 checksum: 206904 373aebaefc9d3b9df2eed33d77b737fd\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-psql_3.3.4-3sarge3_mips.deb\n Size/MD5 checksum: 50054 e4ef231609924ee4dd418e4b79370db0\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-mysql_3.3.4-3sarge3_mips.deb\n Size/MD5 checksum: 45568 262d1ee82b17a0bbf36097c75009e5ee\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-compat-headers_3.3.4-3sarge3_mips.deb\n Size/MD5 checksum: 34416 0559bceb3bcd347974386d454ad0a178\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-sqlite_3.3.4-3sarge3_mips.deb\n Size/MD5 checksum: 207058 73ed1a44d00926449970dd90ba5b0862\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-dev-tools-embedded_3.3.4-3sarge3_mips.deb\n Size/MD5 checksum: 278262 0f5959f8dfc121a1481e8b7ae5485f7b\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-headers_3.3.4-3sarge3_mips.deb\n Size/MD5 checksum: 350222 6892d8ade8e7b21490bd029d0f6bd999\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-odbc_3.3.4-3sarge3_mips.deb\n Size/MD5 checksum: 61358 a1200f5e10a13752876a07c58e92ee6f\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt-dev_3.3.4-3sarge3_mips.deb\n Size/MD5 checksum: 46562 56cb51092e116c8b7c60422955c1c09c\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-designer_3.3.4-3sarge3_mips.deb\n Size/MD5 checksum: 4031286 74b1faa72337fc3a616136cfcdc30b1f\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-apps-dev_3.3.4-3sarge3_mips.deb\n Size/MD5 checksum: 2091118 85d3afe5963afd3bd11af4d90f68cece\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-mt_3.3.4-3sarge3_mips.deb\n Size/MD5 checksum: 2973032 69e9b13a2ce5ddd7a2de488407348d56\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-assistant_3.3.4-3sarge3_mips.deb\n Size/MD5 checksum: 241750 09b9ac8d5bd694ac511cc9d588b52ae3\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-mt-odbc_3.3.4-3sarge3_mips.deb\n Size/MD5 checksum: 61240 1db75ffa1639210a9b4453ee38f74657\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-mt-psql_3.3.4-3sarge3_mips.deb\n Size/MD5 checksum: 49930 b09651aad6bdfe376b337d5b724a579b\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-dev-tools_3.3.4-3sarge3_mips.deb\n Size/MD5 checksum: 1184330 2f6d7093f2e2b4df1586c1f65f386210\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102_3.3.4-3sarge3_mips.deb\n Size/MD5 checksum: 2870448 b42d7fd2beecd80ac3a41fe17cbd37ef\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-mt-mysql_3.3.4-3sarge3_mips.deb\n Size/MD5 checksum: 45454 ca50e5b1b51313471ace4493e01f66dd\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-dev-tools-compat_3.3.4-3sarge3_mips.deb\n Size/MD5 checksum: 68670 0a5e5c9e90e9d7144319c2ca33ec4104\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-dev_3.3.4-3sarge3_mips.deb\n Size/MD5 checksum: 40618 8ae9bf7f416dda9cf32867e8471106a8\n\nmipsel architecture (MIPS (Little Endian))\n\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-designer_3.3.4-3sarge3_mipsel.deb\n Size/MD5 checksum: 4014766 4cc78aaf4af438be9132e96cf68350d1\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-dev-tools_3.3.4-3sarge3_mipsel.deb\n Size/MD5 checksum: 1173436 bf1994ef53fb34dea39962b762d1ff1b\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-compat-headers_3.3.4-3sarge3_mipsel.deb\n Size/MD5 checksum: 34408 1c94bceecbf4793261c2e28b59be7a4c\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-apps-dev_3.3.4-3sarge3_mipsel.deb\n Size/MD5 checksum: 2065432 c5b022a1fa8fae7e7db3503673c266b7\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-assistant_3.3.4-3sarge3_mipsel.deb\n Size/MD5 checksum: 240120 ee5c5deb7466938addf3a14200cbc1d5\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-dev_3.3.4-3sarge3_mipsel.deb\n Size/MD5 checksum: 40612 0aa36d04470ee3ccb1103e0a7329cf0d\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-psql_3.3.4-3sarge3_mipsel.deb\n Size/MD5 checksum: 49922 c3ca71b709c7523be273574abd0d6c36\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-dev-tools-embedded_3.3.4-3sarge3_mipsel.deb\n Size/MD5 checksum: 277906 260d21df849edd7f823e3358744c8bf7\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-sqlite_3.3.4-3sarge3_mipsel.deb\n Size/MD5 checksum: 206110 d3749e62388b5d0d86a8abca7d1e8b4f\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-mt-sqlite_3.3.4-3sarge3_mipsel.deb\n Size/MD5 checksum: 205986 9c1203479826229553f77999c005dafe\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-mt-mysql_3.3.4-3sarge3_mipsel.deb\n Size/MD5 checksum: 45254 3ed1eff8e1b3b125b1bb057d21364804\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-mt-psql_3.3.4-3sarge3_mipsel.deb\n Size/MD5 checksum: 49816 cc316390df75611bb064a9803c74e614\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102_3.3.4-3sarge3_mipsel.deb\n Size/MD5 checksum: 2853170 b92ebaf3d2e999b886e5b24cfbe347a8\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-mysql_3.3.4-3sarge3_mipsel.deb\n Size/MD5 checksum: 45370 2291034b24d5e47209ee3ad368bd0276\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt-dev_3.3.4-3sarge3_mipsel.deb\n Size/MD5 checksum: 46562 9abb3df812c51eab727f66589511661d\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-qtconfig_3.3.4-3sarge3_mipsel.deb\n Size/MD5 checksum: 88376 ebb9470001db501de0967d7320ae74e7\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-odbc_3.3.4-3sarge3_mipsel.deb\n Size/MD5 checksum: 61096 1d9c0a631f7401ca937c886438920d1b\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-mt_3.3.4-3sarge3_mipsel.deb\n Size/MD5 checksum: 2954874 91cb8b7fd147ab8383605c7c594d3b03\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-mt-odbc_3.3.4-3sarge3_mipsel.deb\n Size/MD5 checksum: 60960 f74942513ca785cfa3dfc19c46cbaeb0\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-dev-tools-compat_3.3.4-3sarge3_mipsel.deb\n Size/MD5 checksum: 68632 9716ab432b91eef6d27593cb8f47e810\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-headers_3.3.4-3sarge3_mipsel.deb\n Size/MD5 checksum: 350232 f766e3e787875d4c37ade5e84570d377\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-linguist_3.3.4-3sarge3_mipsel.deb\n Size/MD5 checksum: 335542 a8966ba0eb76e9252a57c8dbbd540fba\n\npowerpc architecture (PowerPC)\n\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-odbc_3.3.4-3sarge3_powerpc.deb\n Size/MD5 checksum: 63626 995b5929b99c83c9b5093abd882ce6c9\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-sqlite_3.3.4-3sarge3_powerpc.deb\n Size/MD5 checksum: 211832 ef0383b9463efb31a40a332519bc579c\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-dev-tools-embedded_3.3.4-3sarge3_powerpc.deb\n Size/MD5 checksum: 280634 c4ea0ef43a3bb9ad64ccb15a3745059e\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-mt-psql_3.3.4-3sarge3_powerpc.deb\n Size/MD5 checksum: 52240 a1db1f055bb8e6b85e74ce45c22b1cae\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-dev_3.3.4-3sarge3_powerpc.deb\n Size/MD5 checksum: 40610 d5df8427dfff2e335bfc49585b99e424\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-mt-odbc_3.3.4-3sarge3_powerpc.deb\n Size/MD5 checksum: 63506 87a170fbaaab911b300d162e6da35e09\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-linguist_3.3.4-3sarge3_powerpc.deb\n Size/MD5 checksum: 330702 b14822be0b5b3c51295bd99ae3095baf\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-headers_3.3.4-3sarge3_powerpc.deb\n Size/MD5 checksum: 350190 321f74f9adae196d0c8edb0394d4bd58\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-mt-mysql_3.3.4-3sarge3_powerpc.deb\n Size/MD5 checksum: 46734 a622fc51c0117b4b0e109401a8cc183d\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-mysql_3.3.4-3sarge3_powerpc.deb\n Size/MD5 checksum: 46864 be884b424fdd90df3a1e3963b5650a26\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-dev-tools-compat_3.3.4-3sarge3_powerpc.deb\n Size/MD5 checksum: 69024 5b5f5c692fa35376c3432619bf516b6a\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-compat-headers_3.3.4-3sarge3_powerpc.deb\n Size/MD5 checksum: 34388 b7b6a8ec7f53da947be126ed35686654\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-psql_3.3.4-3sarge3_powerpc.deb\n Size/MD5 checksum: 52360 3862d8700c39d7ab5a93031cfa629a06\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-mt-sqlite_3.3.4-3sarge3_powerpc.deb\n Size/MD5 checksum: 211658 e170d2b5a1b759e4e1dc58ff765e5aa1\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-qtconfig_3.3.4-3sarge3_powerpc.deb\n Size/MD5 checksum: 88246 7997ace079d6b903b70c7c7f1df3ade8\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-designer_3.3.4-3sarge3_powerpc.deb\n Size/MD5 checksum: 3972268 3966a7208c40821108ee6620d3e064d0\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-mt_3.3.4-3sarge3_powerpc.deb\n Size/MD5 checksum: 2966528 fc08679f17aa33859cb7460f31529749\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-dev-tools_3.3.4-3sarge3_powerpc.deb\n Size/MD5 checksum: 1199892 b21e749cdd24b253b030a323ef3904f6\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102_3.3.4-3sarge3_powerpc.deb\n Size/MD5 checksum: 2860106 4d81ab8bb85475e86829983815b8e604\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt-dev_3.3.4-3sarge3_powerpc.deb\n Size/MD5 checksum: 46570 335373ac37672cf5afb87cbf05c4d076\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-assistant_3.3.4-3sarge3_powerpc.deb\n Size/MD5 checksum: 234268 7b6f69a8022903cda895068bf643a22e\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-apps-dev_3.3.4-3sarge3_powerpc.deb\n Size/MD5 checksum: 2090616 977cbbb6975224cdfd5eb91aab774222\n\ns390 architecture (IBM S/390)\n\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-qtconfig_3.3.4-3sarge3_s390.deb\n Size/MD5 checksum: 88782 98f6b28e2b92685c1bf9a27b86bc2977\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-mt-psql_3.3.4-3sarge3_s390.deb\n Size/MD5 checksum: 53408 8ab0bbe4c70f9074e2884fed9ad05568\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-mt-odbc_3.3.4-3sarge3_s390.deb\n Size/MD5 checksum: 66848 7ae595996c3eea81a18bf5c0705ed9a5\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102_3.3.4-3sarge3_s390.deb\n Size/MD5 checksum: 3144786 6c5319edeec4b4ce3bcb2f1558d55e0f\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-odbc_3.3.4-3sarge3_s390.deb\n Size/MD5 checksum: 66972 e104b946d7ade403539ee316f889018a\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt-dev_3.3.4-3sarge3_s390.deb\n Size/MD5 checksum: 46554 0df4fac6b95c28f46f69f5bd47a9875f\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-dev-tools-compat_3.3.4-3sarge3_s390.deb\n Size/MD5 checksum: 66740 f8c6f2ff506fca1a76ba4ee4c630290a\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-dev-tools_3.3.4-3sarge3_s390.deb\n Size/MD5 checksum: 1089878 bdea5157b66fb7fda4bae8a34da4e12a\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-linguist_3.3.4-3sarge3_s390.deb\n Size/MD5 checksum: 337432 586c2ee85a435c0889c962b37432ae2b\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-mt_3.3.4-3sarge3_s390.deb\n Size/MD5 checksum: 3263772 c9d001e70da43b975b528bf3038dc00d\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-headers_3.3.4-3sarge3_s390.deb\n Size/MD5 checksum: 350172 464b1370fce3e7b03b1f158f35b21a8b\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-apps-dev_3.3.4-3sarge3_s390.deb\n Size/MD5 checksum: 2060088 7afce52fa8842151a011cc1ee8a1f71d\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-compat-headers_3.3.4-3sarge3_s390.deb\n Size/MD5 checksum: 34356 d90c1bafecd0340ca4c4614991d199a8\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-psql_3.3.4-3sarge3_s390.deb\n Size/MD5 checksum: 53528 069a626ece7d3f9ccea1a5d10e3548f7\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-assistant_3.3.4-3sarge3_s390.deb\n Size/MD5 checksum: 238398 2603217c16cb3700c4be120c574312f3\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-sqlite_3.3.4-3sarge3_s390.deb\n Size/MD5 checksum: 219860 080f2e4b70d83888f92fa7f54ef0eb3a\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-designer_3.3.4-3sarge3_s390.deb\n Size/MD5 checksum: 4059224 7965306f76da3e2bb16a58c3e47578ad\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-dev-tools-embedded_3.3.4-3sarge3_s390.deb\n Size/MD5 checksum: 282572 61696b6cf824ffe606ef2766769ae15b\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-mysql_3.3.4-3sarge3_s390.deb\n Size/MD5 checksum: 47928 b9bc22aa6e15fae943acd41dda8ae84d\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-dev_3.3.4-3sarge3_s390.deb\n Size/MD5 checksum: 40590 3f60e3919bc38fe7208fb9dcb5415c48\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-mt-mysql_3.3.4-3sarge3_s390.deb\n Size/MD5 checksum: 47824 c158600761e46210e0361e062fac1174\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-mt-sqlite_3.3.4-3sarge3_s390.deb\n Size/MD5 checksum: 219702 89ee0ffc9b016a30bd8f43cd9b88ac1e\n\nsparc architecture (Sun SPARC/UltraSPARC)\n\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-mt-odbc_3.3.4-3sarge3_sparc.deb\n Size/MD5 checksum: 61588 e95225ad552304bfde9b4d47962abd9e\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-mt-psql_3.3.4-3sarge3_sparc.deb\n Size/MD5 checksum: 50936 55fc0c67a74b2b225c080b4902acd5a5\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-mt_3.3.4-3sarge3_sparc.deb\n Size/MD5 checksum: 2928588 5d647ee0f9542c4f15f682c1b168a835\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-dev_3.3.4-3sarge3_sparc.deb\n Size/MD5 checksum: 40610 1326c86f6772e954f5310679fd6c18d0\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-compat-headers_3.3.4-3sarge3_sparc.deb\n Size/MD5 checksum: 34378 d780d49a0dd8ef072956371ffa06f9b1\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-mysql_3.3.4-3sarge3_sparc.deb\n Size/MD5 checksum: 45394 f8d7c691b4eb2ca78ff097ee0123f039\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-apps-dev_3.3.4-3sarge3_sparc.deb\n Size/MD5 checksum: 2056518 baf0f5bfa1b7bde87299cf9797376ff9\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-assistant_3.3.4-3sarge3_sparc.deb\n Size/MD5 checksum: 233638 170a1ffec4bbd4708137aac4e04c0e9d\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-linguist_3.3.4-3sarge3_sparc.deb\n Size/MD5 checksum: 328964 4dc376eb2a6f792ecf45557390e0a342\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-headers_3.3.4-3sarge3_sparc.deb\n Size/MD5 checksum: 350216 32a956e68718f3edcee5fbc2d447ebfe\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-mt-mysql_3.3.4-3sarge3_sparc.deb\n Size/MD5 checksum: 45282 9de7fa4579993dbd1b447454afd3fdfd\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-mt-sqlite_3.3.4-3sarge3_sparc.deb\n Size/MD5 checksum: 209122 1f7e0af93e3cbce9e340d693794ded5a\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102_3.3.4-3sarge3_sparc.deb\n Size/MD5 checksum: 2820690 98d1ca3ad9a1ae5acd2896fd6e873c14\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt-dev_3.3.4-3sarge3_sparc.deb\n Size/MD5 checksum: 46564 70ff59c01d7c357e1d06ceeaccbd3d7c\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-dev-tools_3.3.4-3sarge3_sparc.deb\n Size/MD5 checksum: 1164210 87ebd4b473b2fead930b0635a52f8175\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-psql_3.3.4-3sarge3_sparc.deb\n Size/MD5 checksum: 51052 6f3d9d0023606338a171b14146fdd450\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-sqlite_3.3.4-3sarge3_sparc.deb\n Size/MD5 checksum: 209240 9f51efe03b3eb4871f1dfeb75075fa0b\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-designer_3.3.4-3sarge3_sparc.deb\n Size/MD5 checksum: 3989660 c7b2896a93b7dabda2ec2fd8632b3d46\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3c102-odbc_3.3.4-3sarge3_sparc.deb\n Size/MD5 checksum: 61724 722688430e9370fbcde3e7e9c4ecd7d3\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-qtconfig_3.3.4-3sarge3_sparc.deb\n Size/MD5 checksum: 87634 f7cb6365b102fcb15580b693414783af\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-dev-tools-embedded_3.3.4-3sarge3_sparc.deb\n Size/MD5 checksum: 278120 dbe8855d687571e04c73b6633b101c7b\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-dev-tools-compat_3.3.4-3sarge3_sparc.deb\n Size/MD5 checksum: 63752 02f650e9cfefd4db2973a12887a142b5\n\nDebian 4.0 (stable)\n- -------------------\n\nStable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.\n\nSource archives:\n\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt-x11-free_3.3.7.orig.tar.gz\n Size/MD5 checksum: 17558148 102fef9d8718df6ccda917090b975f8b\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt-x11-free_3.3.7-4etch1.diff.gz\n Size/MD5 checksum: 235754 f78756d7f3d07b3b8bc05468a94d0236\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt-x11-free_3.3.7-4etch1.dsc\n Size/MD5 checksum: 1822 6fd6a355e18835c0e3ede79790590221\n\nArchitecture independent packages:\n\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-examples_3.3.7-4etch1_all.deb\n Size/MD5 checksum: 1551330 ea1279687117a1803b7a595a4c4db068\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-doc_3.3.7-4etch1_all.deb\n Size/MD5 checksum: 5426284 194ba9a63f9d5f44b1170f213f72d942\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-i18n_3.3.7-4etch1_all.deb\n Size/MD5 checksum: 127346 b86e08c16f1ca39dd55563420962a392\n\nalpha architecture (DEC Alpha)\n\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-dev-tools-embedded_3.3.7-4etch1_alpha.deb\n Size/MD5 checksum: 293904 a63d681e10d3fa6b887758de6aff11bd\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt-odbc_3.3.7-4etch1_alpha.deb\n Size/MD5 checksum: 76886 978739ba45cfec1101fccacabf406b15\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt-dev_3.3.7-4etch1_alpha.deb\n Size/MD5 checksum: 47950 bbc19f4bd2d555e1c98603cd3c1c1019\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-dev-tools-compat_3.3.7-4etch1_alpha.deb\n Size/MD5 checksum: 75986 28fa12779ffb56b6ef660fa2bd8de35b\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-linguist_3.3.7-4etch1_alpha.deb\n Size/MD5 checksum: 367682 cb4704095ae3b2b7ba62447170cdcad3\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-designer_3.3.7-4etch1_alpha.deb\n Size/MD5 checksum: 4330610 e199cd651eab07405bcfa431f5ccd82c\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-headers_3.3.7-4etch1_alpha.deb\n Size/MD5 checksum: 363582 7facf889b3b9abe792b8d82949a29f2e\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt-psql_3.3.7-4etch1_alpha.deb\n Size/MD5 checksum: 58234 b15facac80839e09d9bf5c623cc17dda\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-qtconfig_3.3.7-4etch1_alpha.deb\n Size/MD5 checksum: 108774 90f168ca7d9b0db6bfcb3f625e31f704\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-assistant_3.3.7-4etch1_alpha.deb\n Size/MD5 checksum: 267464 99fa11abcfcd7a76c916acdba857a76c\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt-sqlite_3.3.7-4etch1_alpha.deb\n Size/MD5 checksum: 225968 dad0f004e5880c7ccd44ff2967a70e86\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-apps-dev_3.3.7-4etch1_alpha.deb\n Size/MD5 checksum: 3564778 384c10ba887bb6e9274237c3006c736c\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt-x11-free-dbg_3.3.7-4etch1_alpha.deb\n Size/MD5 checksum: 33203744 4bd3a6a5e053f106dee83c6797d2ec57\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt-mysql_3.3.7-4etch1_alpha.deb\n Size/MD5 checksum: 51898 2ef1c1ac1c0ed1e92f340f0b8295ba6a\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt_3.3.7-4etch1_alpha.deb\n Size/MD5 checksum: 3813894 582c5afa50a506f827d9da727666824a\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-compat-headers_3.3.7-4etch1_alpha.deb\n Size/MD5 checksum: 76768 84ca0c8937f1fab48660b042229242f5\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-dev-tools_3.3.7-4etch1_alpha.deb\n Size/MD5 checksum: 1446546 e147d1742c89d418de6632fe6175392f\n\namd64 architecture (AMD x86_64 (AMD64))\n\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt_3.3.7-4etch1_amd64.deb\n Size/MD5 checksum: 3447250 7146a1383443d91a3af32ca3c57bcae0\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-compat-headers_3.3.7-4etch1_amd64.deb\n Size/MD5 checksum: 76666 ec9de5b82ec0d576f04c73a6de947232\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-dev-tools-compat_3.3.7-4etch1_amd64.deb\n Size/MD5 checksum: 70490 664282891e9e0f2b5bb40c6d68f0502b\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt-x11-free-dbg_3.3.7-4etch1_amd64.deb\n Size/MD5 checksum: 33154822 4a563d4f99ab2e07b8ffde7b72e4c446\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-dev-tools_3.3.7-4etch1_amd64.deb\n Size/MD5 checksum: 1298436 378391a0e2f63c1f637431d72e3f0335\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-designer_3.3.7-4etch1_amd64.deb\n Size/MD5 checksum: 4184800 cb268dafe2e4ce740a8c341020a34cf4\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt-dev_3.3.7-4etch1_amd64.deb\n Size/MD5 checksum: 46414 2e17111cafce04b6915891642542f65b\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-dev-tools-embedded_3.3.7-4etch1_amd64.deb\n Size/MD5 checksum: 292204 14b16bc3c8d6a82703c396044af0bf45\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-assistant_3.3.7-4etch1_amd64.deb\n Size/MD5 checksum: 253494 cc17788e42f1f3de2daedc272201f757\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-linguist_3.3.7-4etch1_amd64.deb\n Size/MD5 checksum: 354242 76322ff0470099d117c905c4e1f5c0b7\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-apps-dev_3.3.7-4etch1_amd64.deb\n Size/MD5 checksum: 2682762 77241b6da88c3e8768bd5d730829a449\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-qtconfig_3.3.7-4etch1_amd64.deb\n Size/MD5 checksum: 101138 a7439357a1f7e1ad5ce5bf41bacfd603\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt-ibase_3.3.7-4etch1_amd64.deb\n Size/MD5 checksum: 56932 887278c41688745bfc7ca9061c872c45\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt-odbc_3.3.7-4etch1_amd64.deb\n Size/MD5 checksum: 72746 88da88ee34e66f41ad8f97995cbcb603\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-headers_3.3.7-4etch1_amd64.deb\n Size/MD5 checksum: 363204 460a564d5f2438009e7504724b26f0b9\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt-mysql_3.3.7-4etch1_amd64.deb\n Size/MD5 checksum: 50412 be9c02adea07ecac9bc43702983d909f\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt-psql_3.3.7-4etch1_amd64.deb\n Size/MD5 checksum: 55960 f413c10bd281fba66d4787d103491142\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt-sqlite_3.3.7-4etch1_amd64.deb\n Size/MD5 checksum: 219344 e86ee485985ffccb814674bfab510132\n\narm architecture (ARM)\n\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-dev-tools-embedded_3.3.7-4etch1_arm.deb\n Size/MD5 checksum: 281458 269cdc2ca3377d376b7712c26ecbf890\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt-psql_3.3.7-4etch1_arm.deb\n Size/MD5 checksum: 52478 26c4ff1a1b01c4ef884641e40f19a859\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-apps-dev_3.3.7-4etch1_arm.deb\n Size/MD5 checksum: 2587330 7e979ad8493732237c774bb31f48fb5e\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt-x11-free-dbg_3.3.7-4etch1_arm.deb\n Size/MD5 checksum: 32923184 4836a05d8c0c15f3be395bd4aed7d4b1\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-assistant_3.3.7-4etch1_arm.deb\n Size/MD5 checksum: 237264 3e00fa910939dddb4da575a87606b5df\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-linguist_3.3.7-4etch1_arm.deb\n Size/MD5 checksum: 341988 b14321fcd6f94245484cddcf9d52b249\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt-sqlite_3.3.7-4etch1_arm.deb\n Size/MD5 checksum: 205752 eef6639d4b4c7b8a3fa67a2df3f5bb57\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-dev-tools-compat_3.3.7-4etch1_arm.deb\n Size/MD5 checksum: 66472 724e20ed1b7f1032adf65c01fed1122d\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-headers_3.3.7-4etch1_arm.deb\n Size/MD5 checksum: 364576 ffd0439ad74d1822cc7a165733492459\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-dev-tools_3.3.7-4etch1_arm.deb\n Size/MD5 checksum: 1431400 f4d4dc5feb8bba68ea9af19b1e260af9\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-compat-headers_3.3.7-4etch1_arm.deb\n Size/MD5 checksum: 77296 9f921e61930b84c278a3f63fa14912f7\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-qtconfig_3.3.7-4etch1_arm.deb\n Size/MD5 checksum: 92626 bd4a1b381a3f41e66ac069bbc0d268f0\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt-mysql_3.3.7-4etch1_arm.deb\n Size/MD5 checksum: 47248 a57624d60e607d5dc9b0b32e71edd7c0\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt_3.3.7-4etch1_arm.deb\n Size/MD5 checksum: 3166592 ce33fa5af7a4f745ac503fb602962037\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-designer_3.3.7-4etch1_arm.deb\n Size/MD5 checksum: 4120670 dd15dfc22418107e1b60d8e22a93c290\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt-dev_3.3.7-4etch1_arm.deb\n Size/MD5 checksum: 47890 8fa2991440154925e326f4d96087006d\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt-odbc_3.3.7-4etch1_arm.deb\n Size/MD5 checksum: 67302 6a22eed2dd119bc503f36ce7eae054a0\n\nhppa architecture (HP PA RISC)\n\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt-mysql_3.3.7-4etch1_hppa.deb\n Size/MD5 checksum: 50268 5f9a58b2a2ed82aa6827b6fa9e1fed28\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-dev-tools-embedded_3.3.7-4etch1_hppa.deb\n Size/MD5 checksum: 291350 5648d5efbd2915628ab9b25da1ead800\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-linguist_3.3.7-4etch1_hppa.deb\n Size/MD5 checksum: 362632 71ee01071f4bb74ab3ae12d78e97b598\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt-sqlite_3.3.7-4etch1_hppa.deb\n Size/MD5 checksum: 219806 d71bf6a414369ca4a88722395df4f4af\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-dev-tools-compat_3.3.7-4etch1_hppa.deb\n Size/MD5 checksum: 73394 a4196330b4a26162759d1e0a24a0465e\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt_3.3.7-4etch1_hppa.deb\n Size/MD5 checksum: 3616446 6cce04e9599e1883d4c460d0367bc97f\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-compat-headers_3.3.7-4etch1_hppa.deb\n Size/MD5 checksum: 77142 917d4af8ce49e87748970ab79c04c737\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt-x11-free-dbg_3.3.7-4etch1_hppa.deb\n Size/MD5 checksum: 33246272 0eee14d260e16b74f6c3809de6a87f1c\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-dev-tools_3.3.7-4etch1_hppa.deb\n Size/MD5 checksum: 1420650 369fffddb97d0e39d1d0b285c5e5411e\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt-dev_3.3.7-4etch1_hppa.deb\n Size/MD5 checksum: 47086 8f4829f33f9eb59c6351480e5360d9cf\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-designer_3.3.7-4etch1_hppa.deb\n Size/MD5 checksum: 4352010 be1c190212982c4d9735383a94ccfdf5\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-apps-dev_3.3.7-4etch1_hppa.deb\n Size/MD5 checksum: 2883656 4b97e9e62c790b050af5ffb6de979de8\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-assistant_3.3.7-4etch1_hppa.deb\n Size/MD5 checksum: 268042 19f7a4c125a6761e9064c8bd6ff81c17\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-headers_3.3.7-4etch1_hppa.deb\n Size/MD5 checksum: 353672 e2be02b453450a0b1b73f526bef591aa\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt-odbc_3.3.7-4etch1_hppa.deb\n Size/MD5 checksum: 72682 fc86ccee53f0a5a63da5cf66554a4110\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt-psql_3.3.7-4etch1_hppa.deb\n Size/MD5 checksum: 56716 c75baa94bdd683a526daf6a42adfbaf6\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-qtconfig_3.3.7-4etch1_hppa.deb\n Size/MD5 checksum: 106106 50cafe8ec14e75b8519b6fe5c0cf8881\n\ni386 architecture (Intel ia32)\n\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-assistant_3.3.7-4etch1_i386.deb\n Size/MD5 checksum: 234212 887b2b23c24e7f694a4755b51d26fac4\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-apps-dev_3.3.7-4etch1_i386.deb\n Size/MD5 checksum: 2375260 0494079c4d7b85d7e0ceb8eb1854764c\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-dev-tools-compat_3.3.7-4etch1_i386.deb\n Size/MD5 checksum: 65148 843c508e2acfd0b0604da2bd9e779b49\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt-mysql_3.3.7-4etch1_i386.deb\n Size/MD5 checksum: 47698 c33fc5d01b467a1852cd1e743fb00b56\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt-odbc_3.3.7-4etch1_i386.deb\n Size/MD5 checksum: 68678 2617ed82ae0b3f223ab404c5ac777961\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-dev-tools-embedded_3.3.7-4etch1_i386.deb\n Size/MD5 checksum: 283444 1376deb0c7ba71cbc38201a136ee7c47\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-designer_3.3.7-4etch1_i386.deb\n Size/MD5 checksum: 4027252 50e43a037daa61888d5124c61aab010a\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-qtconfig_3.3.7-4etch1_i386.deb\n Size/MD5 checksum: 93272 96a6cc802a47edd4c9489c118027c4b2\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-compat-headers_3.3.7-4etch1_i386.deb\n Size/MD5 checksum: 77114 a5059dd478bad07135ee98dabe85ad13\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-dev-tools_3.3.7-4etch1_i386.deb\n Size/MD5 checksum: 1234450 ddacff0056ea9ef57d31ef836a82dda5\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt_3.3.7-4etch1_i386.deb\n Size/MD5 checksum: 3129590 ac9b1f71b4693f7d50d97edfc2c33fd2\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-headers_3.3.7-4etch1_i386.deb\n Size/MD5 checksum: 353656 f10f466d434bd6955d9e7149be30809e\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-linguist_3.3.7-4etch1_i386.deb\n Size/MD5 checksum: 334828 ae599b42c2427297d71b6eb31301c63d\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt-psql_3.3.7-4etch1_i386.deb\n Size/MD5 checksum: 53746 7b5d551b11617a959878e4e59bbda40c\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt-x11-free-dbg_3.3.7-4etch1_i386.deb\n Size/MD5 checksum: 32856370 b3e4fcfbc158d121226b00c2807d690b\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt-dev_3.3.7-4etch1_i386.deb\n Size/MD5 checksum: 47080 e91dcdb0264271350644f36798a758bd\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt-sqlite_3.3.7-4etch1_i386.deb\n Size/MD5 checksum: 197576 cdc7230c7d7789ac64da91d547217b79\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt-ibase_3.3.7-4etch1_i386.deb\n Size/MD5 checksum: 54352 07677a4025099bd8cf276ddaeed223b6\n\nia64 architecture (Intel ia64)\n\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-headers_3.3.7-4etch1_ia64.deb\n Size/MD5 checksum: 353622 3dbec933c04f5f6358076c6ee34d242b\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-qtconfig_3.3.7-4etch1_ia64.deb\n Size/MD5 checksum: 120570 63ef5ff725f2ec97ee26ba185f1b88fd\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-compat-headers_3.3.7-4etch1_ia64.deb\n Size/MD5 checksum: 77092 67bb43acabc1692a02b3a077820691d3\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-dev-tools-compat_3.3.7-4etch1_ia64.deb\n Size/MD5 checksum: 85670 3f954c475ba91d9425f3d18bd5a98ca8\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt-x11-free-dbg_3.3.7-4etch1_ia64.deb\n Size/MD5 checksum: 32390524 c38108ce5f573ddccb976787418e9e64\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-dev-tools_3.3.7-4etch1_ia64.deb\n Size/MD5 checksum: 1765340 3d442f6b6d312d2a73edf34bd7eebedf\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt-mysql_3.3.7-4etch1_ia64.deb\n Size/MD5 checksum: 57672 24ba3b9959e92259ed6eba24db586067\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-designer_3.3.7-4etch1_ia64.deb\n Size/MD5 checksum: 4557144 20fb3e50e75d054e8a7e7c7942a2762f\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt-dev_3.3.7-4etch1_ia64.deb\n Size/MD5 checksum: 47062 e73aa9aec85c436d59c97779aecd5526\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt_3.3.7-4etch1_ia64.deb\n Size/MD5 checksum: 4733124 4d165b022db58b4089bcaa533da7b721\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt-sqlite_3.3.7-4etch1_ia64.deb\n Size/MD5 checksum: 304590 6d8a50f88f62ddd5c1a59f97d589e2ef\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-dev-tools-embedded_3.3.7-4etch1_ia64.deb\n Size/MD5 checksum: 309290 c8a1b9896532005a9a4362bc17364a97\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt-psql_3.3.7-4etch1_ia64.deb\n Size/MD5 checksum: 64748 74bece5867f91a17117021d00bdc654e\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt-odbc_3.3.7-4etch1_ia64.deb\n Size/MD5 checksum: 86070 cd7291fe634cd9b8f479e78c87ebfbef\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-linguist_3.3.7-4etch1_ia64.deb\n Size/MD5 checksum: 392336 fdf87bc5532e9bef6d953410a27bbc11\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-assistant_3.3.7-4etch1_ia64.deb\n Size/MD5 checksum: 294438 2c85f0d995296b96b04d2466bada7969\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-apps-dev_3.3.7-4etch1_ia64.deb\n Size/MD5 checksum: 4032480 880cb3894833f7d75dfcdbf165554ebe\n\nmips architecture (MIPS (Big Endian))\n\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt-psql_3.3.7-4etch1_mips.deb\n Size/MD5 checksum: 52404 c260a758a00ca767a15b0cdfb1779386\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-compat-headers_3.3.7-4etch1_mips.deb\n Size/MD5 checksum: 77182 6ab645edc94249f0440d3e15c53a17e2\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt-dev_3.3.7-4etch1_mips.deb\n Size/MD5 checksum: 47082 b92c583b5d1c83c9160b787ba909fc73\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-linguist_3.3.7-4etch1_mips.deb\n Size/MD5 checksum: 354792 78d1ed3665cb0c8357438926567c2555\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-dev-tools_3.3.7-4etch1_mips.deb\n Size/MD5 checksum: 1279556 359c107b3fbebc590760908350528451\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt-x11-free-dbg_3.3.7-4etch1_mips.deb\n Size/MD5 checksum: 34074946 5adf882bd6b8cab3ef607008a761ed3f\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-headers_3.3.7-4etch1_mips.deb\n Size/MD5 checksum: 353708 5c311488fb9a726e53baf72b50ebd515\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-dev-tools-compat_3.3.7-4etch1_mips.deb\n Size/MD5 checksum: 72150 65802bef124820643905dcc472b53ce4\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-dev-tools-embedded_3.3.7-4etch1_mips.deb\n Size/MD5 checksum: 285980 c37f0bcbbca24d9da4bd375e4753e868\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-qtconfig_3.3.7-4etch1_mips.deb\n Size/MD5 checksum: 98720 7d932a266695c9f86cd6e4b8b20533e9\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt_3.3.7-4etch1_mips.deb\n Size/MD5 checksum: 3206942 2aac196b4fcabfdd04684562be8d2b44\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-designer_3.3.7-4etch1_mips.deb\n Size/MD5 checksum: 4153862 0f1dcd967c24993d3aa10b7b0e96dc1b\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt-odbc_3.3.7-4etch1_mips.deb\n Size/MD5 checksum: 66848 071b170f975cd31324d8e2c72f51ea04\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt-mysql_3.3.7-4etch1_mips.deb\n Size/MD5 checksum: 47680 51e55a97fded6ef0118f737c9f8b286a\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt-sqlite_3.3.7-4etch1_mips.deb\n Size/MD5 checksum: 200188 ab52da82ab18f37a173bb2a56dfff986\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-apps-dev_3.3.7-4etch1_mips.deb\n Size/MD5 checksum: 2706160 ae0dba769b353ef1e0310bb31c068b7e\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-assistant_3.3.7-4etch1_mips.deb\n Size/MD5 checksum: 259384 d4fcafe8be0e9697e72211f84fa49505\n\nmipsel architecture (MIPS (Little Endian))\n\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt-dev_3.3.7-4etch1_mipsel.deb\n Size/MD5 checksum: 47094 f0d9f03d015af26517fff62af2b3d88d\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt-sqlite_3.3.7-4etch1_mipsel.deb\n Size/MD5 checksum: 198606 db47bb75c9fba2d06d69b4460466753f\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-assistant_3.3.7-4etch1_mipsel.deb\n Size/MD5 checksum: 256512 dfb053ae13255bd4f83e5c1d8f03faaf\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-apps-dev_3.3.7-4etch1_mipsel.deb\n Size/MD5 checksum: 2648392 85abcc70f217d1adf0d70f13577ad9d8\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-headers_3.3.7-4etch1_mipsel.deb\n Size/MD5 checksum: 353712 86b5878ccf74ae62bc2cd23149154310\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt-psql_3.3.7-4etch1_mipsel.deb\n Size/MD5 checksum: 51978 a8c569685986edb7f702c4bf165cf053\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-compat-headers_3.3.7-4etch1_mipsel.deb\n Size/MD5 checksum: 77180 bf21b5f955e11ab073df713ac97027ae\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt-mysql_3.3.7-4etch1_mipsel.deb\n Size/MD5 checksum: 47374 dd0136cb391de0fc8a71f7431c82fb5b\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-linguist_3.3.7-4etch1_mipsel.deb\n Size/MD5 checksum: 352574 4b7836ab4fc1a0d76f69ea95e9f10947\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-dev-tools-embedded_3.3.7-4etch1_mipsel.deb\n Size/MD5 checksum: 285194 36f0e76e9deab17533ef3b1811a227f2\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt-odbc_3.3.7-4etch1_mipsel.deb\n Size/MD5 checksum: 66338 390a54cad23acb927032cbff9185654d\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-dev-tools-compat_3.3.7-4etch1_mipsel.deb\n Size/MD5 checksum: 71724 f0c6ca1d668e103ccf1b1392f8c75f6f\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-dev-tools_3.3.7-4etch1_mipsel.deb\n Size/MD5 checksum: 1257176 72e83140ea99feb764de53dfd190958c\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt-x11-free-dbg_3.3.7-4etch1_mipsel.deb\n Size/MD5 checksum: 33298570 cb705878534bce4b87e7aabd185f20bc\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-qtconfig_3.3.7-4etch1_mipsel.deb\n Size/MD5 checksum: 97852 1e809b096bb96118a1a9a8afcfae5360\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-designer_3.3.7-4etch1_mipsel.deb\n Size/MD5 checksum: 4125760 ded3a7edce31793cefa19ee549b45814\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt_3.3.7-4etch1_mipsel.deb\n Size/MD5 checksum: 3140644 dac0dde63708d5166f2038db13c97137\n\npowerpc architecture (PowerPC)\n\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-qtconfig_3.3.7-4etch1_powerpc.deb\n Size/MD5 checksum: 92864 13443cf3320e8aac49099c233729653d\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-compat-headers_3.3.7-4etch1_powerpc.deb\n Size/MD5 checksum: 77154 7307f5a7228eda469c3a86039b724af2\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt-psql_3.3.7-4etch1_powerpc.deb\n Size/MD5 checksum: 53350 e564ea9ba833997c06e7ed45a5b4392f\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt-sqlite_3.3.7-4etch1_powerpc.deb\n Size/MD5 checksum: 201380 5cdfa86f83f27b16456dbe82a0a7d5cc\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt-odbc_3.3.7-4etch1_powerpc.deb\n Size/MD5 checksum: 66684 85febe17384e616a4a74271b1f3e6760\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-apps-dev_3.3.7-4etch1_powerpc.deb\n Size/MD5 checksum: 2461816 c56869700f1b65078e7ca5550bee4998\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt-dev_3.3.7-4etch1_powerpc.deb\n Size/MD5 checksum: 47090 1267219c4866a497233afe6ff907815c\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt-mysql_3.3.7-4etch1_powerpc.deb\n Size/MD5 checksum: 47590 d20b7ff5486484543970fbafae2a05ca\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt_3.3.7-4etch1_powerpc.deb\n Size/MD5 checksum: 3110450 de1ee725f6726739799f22494786b5c1\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-headers_3.3.7-4etch1_powerpc.deb\n Size/MD5 checksum: 353666 a2adaa55e00ed1088e0a1ebc1ba1a231\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-dev-tools_3.3.7-4etch1_powerpc.deb\n Size/MD5 checksum: 1249818 345d08e1972c1f22f566b511fce6dbc2\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-designer_3.3.7-4etch1_powerpc.deb\n Size/MD5 checksum: 3990916 05ee558f6be5be164e1dbe05833a55cd\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-assistant_3.3.7-4etch1_powerpc.deb\n Size/MD5 checksum: 234120 f1606bb609ba457aac1243bb2b0734b1\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt-x11-free-dbg_3.3.7-4etch1_powerpc.deb\n Size/MD5 checksum: 33621472 4b537ba38faf1d79e6d9138364006817\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-dev-tools-compat_3.3.7-4etch1_powerpc.deb\n Size/MD5 checksum: 68674 e23e85768018f4f71be791efdd8712a4\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-dev-tools-embedded_3.3.7-4etch1_powerpc.deb\n Size/MD5 checksum: 283368 645194bbee14216146dc293916be933b\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-linguist_3.3.7-4etch1_powerpc.deb\n Size/MD5 checksum: 332068 206c31def5da5ed4a749bf3422fb61ba\n\ns390 architecture (IBM S/390)\n\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt-psql_3.3.7-4etch1_s390.deb\n Size/MD5 checksum: 58258 77b68f1137996288e8adeafe3e00d393\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-headers_3.3.7-4etch1_s390.deb\n Size/MD5 checksum: 353630 db219fd1a29081ed3afb9eb8d0db2b3d\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt-odbc_3.3.7-4etch1_s390.deb\n Size/MD5 checksum: 77238 13c36a1dff3fdc86ee8df571e502c171\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt-dev_3.3.7-4etch1_s390.deb\n Size/MD5 checksum: 47064 910701657b260e0ccdf7ddbff3663aaf\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-linguist_3.3.7-4etch1_s390.deb\n Size/MD5 checksum: 355176 8b547c7e422fcd88598bae37d39295b5\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt-x11-free-dbg_3.3.7-4etch1_s390.deb\n Size/MD5 checksum: 33731208 8815ba6e0ed56cee68f2305e31edd9f3\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt-sqlite_3.3.7-4etch1_s390.deb\n Size/MD5 checksum: 230510 c77dbaa4a71a919cc2f2a9e55e18282d\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-compat-headers_3.3.7-4etch1_s390.deb\n Size/MD5 checksum: 77082 6a38ffff75093c480d6c0d5f9e1cac08\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt-mysql_3.3.7-4etch1_s390.deb\n Size/MD5 checksum: 52332 b02b7009b3a226c7be2a05849945b81d\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-designer_3.3.7-4etch1_s390.deb\n Size/MD5 checksum: 4175488 4a712b4b6f6e160dd39f3309c1208429\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt_3.3.7-4etch1_s390.deb\n Size/MD5 checksum: 3682542 03906477434f2476682f89a7c5b888cf\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-dev-tools_3.3.7-4etch1_s390.deb\n Size/MD5 checksum: 1217812 7e219d9cd7acad86161b7a809b6ec6f3\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-qtconfig_3.3.7-4etch1_s390.deb\n Size/MD5 checksum: 96646 55c010171a6fd87608c427df0cb14b70\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-apps-dev_3.3.7-4etch1_s390.deb\n Size/MD5 checksum: 2751828 d06a34f7396c5c81493cb84edd4d8bb3\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-assistant_3.3.7-4etch1_s390.deb\n Size/MD5 checksum: 257306 1068d802d98075929c44a433d5cd6fed\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-dev-tools-embedded_3.3.7-4etch1_s390.deb\n Size/MD5 checksum: 290558 97b6c78ce864d55527141be68d07fcbb\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-dev-tools-compat_3.3.7-4etch1_s390.deb\n Size/MD5 checksum: 71688 99d4f7b483a27cbfe485d018875b72d7\n\nsparc architecture (Sun SPARC/UltraSPARC)\n\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-designer_3.3.7-4etch1_sparc.deb\n Size/MD5 checksum: 4137256 bacec2ad2b118320a710fb251a962f31\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt-sqlite_3.3.7-4etch1_sparc.deb\n Size/MD5 checksum: 204616 eeb8353361108364351aa84c9d949eb0\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt-x11-free-dbg_3.3.7-4etch1_sparc.deb\n Size/MD5 checksum: 33329238 00dbda4e7685cd62755cdfc1a16b4473\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt-psql_3.3.7-4etch1_sparc.deb\n Size/MD5 checksum: 53118 ae08fb2f0863dfce8990bc312f327865\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-headers_3.3.7-4etch1_sparc.deb\n Size/MD5 checksum: 353660 167b973255366080f3857788427ff14b\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-apps-dev_3.3.7-4etch1_sparc.deb\n Size/MD5 checksum: 2364300 5842cd352ab7755c44729214e8661e6e\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-dev-tools-compat_3.3.7-4etch1_sparc.deb\n Size/MD5 checksum: 65548 9456280e0c2bec6325817d1e49b5a772\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt-dev_3.3.7-4etch1_sparc.deb\n Size/MD5 checksum: 47086 a51c158b132de79de7a9152de1e26d0e\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt-odbc_3.3.7-4etch1_sparc.deb\n Size/MD5 checksum: 67686 c097c5239a57f77164a4ea38127b7bc2\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-assistant_3.3.7-4etch1_sparc.deb\n Size/MD5 checksum: 246536 11e235e82640fc63518d0b9877d5b56e\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-dev-tools-embedded_3.3.7-4etch1_sparc.deb\n Size/MD5 checksum: 283678 139ec5713266e413dff90c01a3b222d9\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-compat-headers_3.3.7-4etch1_sparc.deb\n Size/MD5 checksum: 77128 12ee66d65df5eeeeebedd1e89dfe35b9\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt_3.3.7-4etch1_sparc.deb\n Size/MD5 checksum: 3367190 651730b2992ae42c3316ad188147e9c7\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-dev-tools_3.3.7-4etch1_sparc.deb\n Size/MD5 checksum: 1356256 21a9f1e764243c7ba525d9a7c396082e\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-linguist_3.3.7-4etch1_sparc.deb\n Size/MD5 checksum: 340102 a1b57b797e1ba3832f8fc5ab96b65608\n http://security.debian.org/pool/updates/main/q/qt-x11-free/libqt3-mt-mysql_3.3.7-4etch1_sparc.deb\n Size/MD5 checksum: 47136 ef416edcb22bb4d9fbc99ab93277b5a4\n http://security.debian.org/pool/updates/main/q/qt-x11-free/qt3-qtconfig_3.3.7-4etch1_sparc.deb\n Size/MD5 checksum: 94402 9b28bd7de149f4a643ece2028cb86ff4\n\n\n These files will probably be moved into the stable distribution on\n its next update.\n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>", "cvss3": {}, "published": "2007-12-08T11:54:32", "type": "debian", "title": "[SECURITY] [DSA 1426-1] New qt-x11-free packages fix several vulnerabilities", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": true, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2007-3388", "CVE-2007-4137"], "modified": "2007-12-08T11:54:32", "id": "DEBIAN:DSA-1426-1:21F58", "href": "https://lists.debian.org/debian-security-announce/2007/msg00207.html", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "fedora": [{"lastseen": "2020-12-21T08:17:48", "description": "Qt is a GUI software toolkit which simplifies the task of writing and maintaining GUI (Graphical User Interface) applications for the X Window System. Qt is written in C++ and is fully object-oriented. This package contains the shared library needed to run qt applications, as well as the README files for qt. ", "edition": 2, "cvss3": {}, "published": "2007-09-19T02:53:35", "type": "fedora", "title": "[SECURITY] Fedora 7 Update: qt-3.3.8-7.fc7", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": true, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2007-3388", "CVE-2007-4137"], "modified": "2007-09-19T02:53:35", "id": "FEDORA:L8J2RWZB020564", "href": "", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-12-21T08:17:48", "description": "Qt is a GUI software toolkit which simplifies the task of writing and maintaining GUI (Graphical User Interface) applications for the X Window System. Qt is written in C++ and is fully object-oriented. This package contains the shared library needed to run qt applications, as well as the README files for qt. ", "edition": 2, "cvss3": {}, "published": "2007-09-18T22:38:37", "type": "fedora", "title": "[SECURITY] Fedora Core 6 Update: qt-3.3.8-2.fc6", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": true, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2007-0242", "CVE-2007-3388", "CVE-2007-4137"], "modified": "2007-09-18T22:38:37", "id": "FEDORA:L8IMCBQQ018336", "href": "", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}]}