Trolltech QT Pixmap图形处理整数溢出漏洞

漏洞信息详情

Trolltech QT Pixmap图形处理整数溢出漏洞

漏洞简介

Qt是一款C++应用开发工具,包括类库和跨平台开放工具。

Qt处理Pixmap图形的方式存在整数溢出漏洞,远程攻击者可能利用此漏洞在用户机器上执行任意指令。

如果攻击者能够诱骗用户使用链接到Qt的应用程序(如knoqueror和kmail)处理特制的pixmap图形的话,就会导致向堆中写入任意数据,执行任意指令。

漏洞公告

目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接:

http://www.debian.org/security/2006/dsa-1200

RedHat已经为此发布了安全公告(RHSA-2006:0725-01, RHSA-2006:0720-01)以及相应补丁:

RHSA-2006:0720-01:Critical: kdelibs security update

链接:

http://lwn.net/Alerts/204896/?format=printable

RHSA-2006:0725-01:Moderate: qt security update

链接:

http://www.auscert.org.au/render.html?it=6927&template=1

Gentoo已经为此发布了一个安全公告(GLSA-200611-02)以及相应补丁:

GLSA-200611-02:Qt: Integer overflow

链接:

http://security.gentoo.org/glsa/glsa-200611-02.xml

所有Qt 3.x用户都应升级到最新版本:

# emerge –sync

# emerge –ask –oneshot –verbose “>=3Dx11-libs/qt-3.3.6-r4”

所有Qt 4.x用户都应升级到最新版本:

# emerge –sync

# emerge –ask –oneshot –verbose “>=3Dx11-libs/qt-4.1.4-r2”

参考网址

来源:SECUNIA

链接:http://secunia.com/advisories/22479

来源:GENTOO

链接:http://security.gentoo.org/glsa/glsa-200611-02.xml

来源:SECUNIA

链接:http://secunia.com/advisories/22579

来源:VUPEN

链接:http://www.vupen.com/english/advisories/2006/4099

来源:SECUNIA

链接:http://secunia.com/advisories/22397

来源:SECUNIA

链接:http://secunia.com/advisories/22738

来源:OVAL

链接:https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10218

来源:BUGTRAQ

链接:http://www.securityfocus.com/archive/1/449173/100/0/threaded

来源:SLACKWARE

链接:http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.483634

来源:BID

链接:https://www.securityfocus.com/bid/20599

来源:SECUNIA

链接:http://secunia.com/advisories/22380

来源:SECTRACK

链接:http://securitytracker.com/id?1017084

来源:DEBIAN

链接:http://www.us.debian.org/security/2006/dsa-1200

来源:REDHAT

链接:http://www.redhat.com/support/errata/RHSA-2006-0720.html

来源:SECUNIA

链接:http://secunia.com/advisories/22589

来源:GENTOO

链接:http://security.gentoo.org/glsa/glsa-200703-06.xml

来源:SECUNIA

链接:http://secunia.com/advisories/22645

来源:SECUNIA

链接:http://secunia.com/advisories/22485

来源:SECUNIA

链接:http://secunia.com/advisories/22520

来源:SECUNIA

链接:http://secunia.com/advisories/22586

来源:SECUNIA

链接:http://secunia.com/advisories/24347

来源:MANDRIVA

链接:http://www.mandriva.com/security/advisories?name=MDKSA-2006:186

来源:SECUNIA

链接:http://secunia.com/advisories/22929

来源:MANDRIVA

链接:http://www.mandriva.com/security/advisories?name=MDKSA-2006:187

来源:CONFIRM

链接:http://www.trolltech.com/company/newsroom/announcements/press.2006-10-19.5434451733

来源:CONFIRM

链接:https://issues.rpath.com/browse/RPL-723

来源:UBUNTU

链接:http://www.ubuntu.com/usn/usn-368-1

来源:SECUNIA

链接:http://secunia.com/advisories/22492

来源:CONFIRM

链接:http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=210742

来源:SUSE

链接:http://lists.suse.com/archive/suse-security-announce/2006-Oct/0006.html

来源:SECUNIA

链接:http://secunia.com/advisories/22890

来源:REDHAT

链接:http://www.redhat.com/support/errata/RHSA-2006-0725.html

受影响实体

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享