Lucene search

K
qtAndy ShawQT:EA1FA9B78CEA9670E59130837BE21776
HistoryMay 02, 2024 - 12:00 a.m.

Security advisory: QStringConverter

2024-05-0200:00:00
Andy Shaw
www.qt.io
28
qstringconverter
invalid pointer
callback
stack modification
cve-2024-33861
qt
vulnerability
specific codec
application data
patch
update
qt 6.5.6
qt 6.7.1
dev
6.7
6.6
6.5
application build
qstringdecoder

AI Score

7.2

Confidence

Low

QStringConverter has an invalid pointer being passed as a callback which can allow modification of the stack and has been assigned the CVE id CVE-2024-33861.

Qt itself is not vulnerable to remote attack however an application using QStringDecoder either directly or indirectly can be vulnerable. This affects Qt 6.5.0->6.5.5, 6.6.x and 6.7.0.

This requires:

  1. the attacker be able to tell the application a specific codec to use

  2. the attacker be able to feed the application data in a specific way to cause the desired modification

  3. the attacker what in the stack will get modified, which requires knowing the build of the application (and not all builds will be vulnerable)

  4. the modification do anything in particular that is useful to the attacker, besides maybe crashing the application

Qt does not automatically use any of those codecs, so this needs the application to implement something using QStringDecoder to be vulnerable.

Solution: Apply the following patch or update to Qt 6.5.6 or Qt 6.7.1.

Patches:

dev: <https://codereview.qt-project.org/c/qt/qtbase/+/555922&gt;
6.7: <https://codereview.qt-project.org/c/qt/qtbase/+/556191&gt; or <https://download.qt.io/official_releases/qt/6.7/CVE-2024-33861-qtbase-6.7.diff&gt;
6.6: <https://download.qt.io/official_releases/qt/6.6/CVE-2024-33861-qtbase-6.6.diff&gt;
6.5: <https://codereview.qt-project.org/c/qt/tqtc-qtbase/+/556369&gt; or <https://download.qt.io/official_releases/qt/6.5/CVE-2024-33861-qtbase-6.5.diff&gt;

AI Score

7.2

Confidence

Low

Related for QT:EA1FA9B78CEA9670E59130837BE21776