Lucene search

K
nvd[email protected]NVD:CVE-2007-4137
HistorySep 18, 2007 - 7:17 p.m.

CVE-2007-4137

2007-09-1819:17:00
CWE-119
web.nvd.nist.gov

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

6.2 Medium

AI Score

Confidence

High

0.016 Low

EPSS

Percentile

87.5%

Off-by-one error in the QUtf8Decoder::toUnicode function in Trolltech Qt 3 allows context-dependent attackers to cause a denial of service (crash) via a crafted Unicode string that triggers a heap-based buffer overflow. NOTE: Qt 4 has the same error in the QUtf8Codec::convertToUnicode function, but it is not exploitable.

Affected configurations

NVD
Node
conectivalinuxMatch9.0
OR
conectivalinuxMatch10.0
OR
gentoolinux
OR
mandrakesoftmandrake_linuxMatch9.2
OR
mandrakesoftmandrake_linuxMatch9.2amd64
OR
mandrakesoftmandrake_linuxMatch10.0
OR
mandrakesoftmandrake_linuxMatch10.0amd64
OR
mandrakesoftmandrake_linuxMatch2007
OR
mandrakesoftmandrake_linuxMatch2007x86_64
OR
mandrakesoftmandrake_linuxMatch2007.1
OR
mandrakesoftmandrake_linuxMatch2007.1x86_64
OR
mandrakesoftmandrake_linux_corporate_serverMatch3.0
OR
mandrakesoftmandrake_linux_corporate_serverMatch3.0x86_64
OR
mandrakesoftmandrake_linux_corporate_serverMatch4.0
OR
mandrakesoftmandrake_linux_corporate_serverMatch4.0x86_64
OR
redhatenterprise_linuxMatch2.1as
OR
redhatenterprise_linuxMatch2.1aw
OR
redhatenterprise_linuxMatch2.1es
OR
redhatenterprise_linuxMatch3.0as
OR
redhatenterprise_linuxMatch3.0es
OR
redhatenterprise_linuxMatch3.0ws
OR
redhatenterprise_linuxMatch4.0as
OR
redhatenterprise_linuxMatch4.0es
OR
redhatenterprise_linuxMatch4.0ws
OR
redhatenterprise_linuxMatch5.0client
OR
redhatenterprise_linuxMatch5.0client_workstation
OR
redhatenterprise_linuxMatch5.0server
OR
redhatlinuxMatch2.1aw_itanium
OR
redhatlinuxMatch3.0
OR
redhatlinuxMatch4.0
OR
ubuntuubuntu_linuxMatch6.06_ltsamd64
OR
ubuntuubuntu_linuxMatch6.06_ltsi386
OR
ubuntuubuntu_linuxMatch6.06_ltspowerpc
OR
ubuntuubuntu_linuxMatch6.06_ltssparc
OR
ubuntuubuntu_linuxMatch6.10amd64
OR
ubuntuubuntu_linuxMatch6.10i386
OR
ubuntuubuntu_linuxMatch6.10powerpc
OR
ubuntuubuntu_linuxMatch6.10sparc
OR
ubuntuubuntu_linuxMatch7.04amd64
OR
ubuntuubuntu_linuxMatch7.04i386
OR
ubuntuubuntu_linuxMatch7.04powerpc
OR
ubuntuubuntu_linuxMatch7.04sparc
AND
trolltechqtMatch3.0
OR
trolltechqtMatch3.0.3
OR
trolltechqtMatch3.0.5
OR
trolltechqtMatch3.1
OR
trolltechqtMatch3.1.1
OR
trolltechqtMatch3.1.2
OR
trolltechqtMatch3.2.1
OR
trolltechqtMatch3.2.3
OR
trolltechqtMatch3.3.0
OR
trolltechqtMatch3.3.1
OR
trolltechqtMatch3.3.2
OR
trolltechqtMatch3.3.3
OR
trolltechqtMatch3.3.4
OR
trolltechqtMatch3.3.5
OR
trolltechqtMatch3.3.6
OR
trolltechqtMatch3.3.7
OR
trolltechqtMatch3.3.8
OR
trolltechqtMatch4.1
OR
trolltechqtMatch4.1.4
OR
trolltechqtMatch4.1.5
OR
trolltechqtMatch4.2
OR
trolltechqtMatch4.2.1
OR
trolltechqtMatch4.2.3

References

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

6.2 Medium

AI Score

Confidence

High

0.016 Low

EPSS

Percentile

87.5%