Vulnerability Details : CVE-2007-4137
Off-by-one error in the QUtf8Decoder::toUnicode function in Trolltech Qt 3 allows context-dependent attackers to cause a denial of service (crash) via a crafted Unicode string that triggers a heap-based buffer overflow. NOTE: Qt 4 has the same error in the QUtf8Codec::convertToUnicode function, but it is not exploitable.
Vulnerability category: OverflowDenial of service
Products affected by CVE-2007-4137
- cpe:2.3:a:trolltech:qt:3.0.3:*:*:*:*:*:*:*When used together with: Mandrakesoft » Mandrake Linux Corporate Server » Version: 3.0 X86 64 EditionWhen used together with: Mandrakesoft » Mandrake Linux Corporate Server » Version: 4.0 X86 64 Edition
- cpe:2.3:a:trolltech:qt:3.1:*:*:*:*:*:*:*When used together with: Mandrakesoft » Mandrake Linux Corporate Server » Version: 3.0 X86 64 EditionWhen used together with: Mandrakesoft » Mandrake Linux Corporate Server » Version: 4.0 X86 64 Edition
- cpe:2.3:a:trolltech:qt:3.3.2:*:*:*:*:*:*:*When used together with: Mandrakesoft » Mandrake Linux Corporate Server » Version: 3.0 X86 64 EditionWhen used together with: Mandrakesoft » Mandrake Linux Corporate Server » Version: 4.0 X86 64 Edition
- cpe:2.3:a:trolltech:qt:3.1.1:*:*:*:*:*:*:*When used together with: Mandrakesoft » Mandrake Linux Corporate Server » Version: 3.0 X86 64 EditionWhen used together with: Mandrakesoft » Mandrake Linux Corporate Server » Version: 4.0 X86 64 Edition
- cpe:2.3:a:trolltech:qt:3.1.2:*:*:*:*:*:*:*When used together with: Mandrakesoft » Mandrake Linux Corporate Server » Version: 3.0 X86 64 EditionWhen used together with: Mandrakesoft » Mandrake Linux Corporate Server » Version: 4.0 X86 64 Edition
- cpe:2.3:a:trolltech:qt:3.2.1:*:*:*:*:*:*:*When used together with: Mandrakesoft » Mandrake Linux Corporate Server » Version: 3.0 X86 64 EditionWhen used together with: Mandrakesoft » Mandrake Linux Corporate Server » Version: 4.0 X86 64 Edition
- cpe:2.3:a:trolltech:qt:3.2.3:*:*:*:*:*:*:*When used together with: Mandrakesoft » Mandrake Linux Corporate Server » Version: 3.0 X86 64 EditionWhen used together with: Mandrakesoft » Mandrake Linux Corporate Server » Version: 4.0 X86 64 Edition
- cpe:2.3:a:trolltech:qt:3.3.0:*:*:*:*:*:*:*When used together with: Mandrakesoft » Mandrake Linux Corporate Server » Version: 3.0 X86 64 EditionWhen used together with: Mandrakesoft » Mandrake Linux Corporate Server » Version: 4.0 X86 64 Edition
- cpe:2.3:a:trolltech:qt:3.0:*:*:*:*:*:*:*When used together with: Mandrakesoft » Mandrake Linux Corporate Server » Version: 3.0 X86 64 EditionWhen used together with: Mandrakesoft » Mandrake Linux Corporate Server » Version: 4.0 X86 64 Edition
- cpe:2.3:a:trolltech:qt:3.0.5:*:*:*:*:*:*:*When used together with: Mandrakesoft » Mandrake Linux Corporate Server » Version: 3.0 X86 64 EditionWhen used together with: Mandrakesoft » Mandrake Linux Corporate Server » Version: 4.0 X86 64 Edition
- cpe:2.3:a:trolltech:qt:3.3.1:*:*:*:*:*:*:*When used together with: Mandrakesoft » Mandrake Linux Corporate Server » Version: 3.0 X86 64 EditionWhen used together with: Mandrakesoft » Mandrake Linux Corporate Server » Version: 4.0 X86 64 Edition
- cpe:2.3:a:trolltech:qt:3.3.3:*:*:*:*:*:*:*When used together with: Mandrakesoft » Mandrake Linux Corporate Server » Version: 3.0 X86 64 EditionWhen used together with: Mandrakesoft » Mandrake Linux Corporate Server » Version: 4.0 X86 64 Edition
- cpe:2.3:a:trolltech:qt:3.3.6:*:*:*:*:*:*:*When used together with: Mandrakesoft » Mandrake Linux Corporate Server » Version: 3.0 X86 64 EditionWhen used together with: Mandrakesoft » Mandrake Linux Corporate Server » Version: 4.0 X86 64 Edition
- cpe:2.3:a:trolltech:qt:3.3.7:*:*:*:*:*:*:*When used together with: Mandrakesoft » Mandrake Linux Corporate Server » Version: 3.0 X86 64 EditionWhen used together with: Mandrakesoft » Mandrake Linux Corporate Server » Version: 4.0 X86 64 Edition
- cpe:2.3:a:trolltech:qt:4.2.3:*:*:*:*:*:*:*When used together with: Mandrakesoft » Mandrake Linux Corporate Server » Version: 3.0 X86 64 EditionWhen used together with: Mandrakesoft » Mandrake Linux Corporate Server » Version: 4.0 X86 64 Edition
- cpe:2.3:a:trolltech:qt:3.3.8:*:*:*:*:*:*:*When used together with: Mandrakesoft » Mandrake Linux Corporate Server » Version: 3.0 X86 64 EditionWhen used together with: Mandrakesoft » Mandrake Linux Corporate Server » Version: 4.0 X86 64 Edition
- cpe:2.3:a:trolltech:qt:4.1:*:*:*:*:*:*:*When used together with: Mandrakesoft » Mandrake Linux Corporate Server » Version: 3.0 X86 64 EditionWhen used together with: Mandrakesoft » Mandrake Linux Corporate Server » Version: 4.0 X86 64 Edition
- cpe:2.3:a:trolltech:qt:3.3.4:*:*:*:*:*:*:*When used together with: Mandrakesoft » Mandrake Linux Corporate Server » Version: 3.0 X86 64 EditionWhen used together with: Mandrakesoft » Mandrake Linux Corporate Server » Version: 4.0 X86 64 Edition
- cpe:2.3:a:trolltech:qt:3.3.5:*:*:*:*:*:*:*When used together with: Mandrakesoft » Mandrake Linux Corporate Server » Version: 3.0 X86 64 EditionWhen used together with: Mandrakesoft » Mandrake Linux Corporate Server » Version: 4.0 X86 64 Edition
- cpe:2.3:a:trolltech:qt:4.2:*:*:*:*:*:*:*When used together with: Mandrakesoft » Mandrake Linux Corporate Server » Version: 3.0 X86 64 EditionWhen used together with: Mandrakesoft » Mandrake Linux Corporate Server » Version: 4.0 X86 64 Edition
- cpe:2.3:a:trolltech:qt:4.2.1:*:*:*:*:*:*:*When used together with: Mandrakesoft » Mandrake Linux Corporate Server » Version: 3.0 X86 64 EditionWhen used together with: Mandrakesoft » Mandrake Linux Corporate Server » Version: 4.0 X86 64 Edition
- cpe:2.3:a:trolltech:qt:4.1.4:*:*:*:*:*:*:*When used together with: Mandrakesoft » Mandrake Linux Corporate Server » Version: 3.0 X86 64 EditionWhen used together with: Mandrakesoft » Mandrake Linux Corporate Server » Version: 4.0 X86 64 Edition
- cpe:2.3:a:trolltech:qt:4.1.5:*:*:*:*:*:*:*When used together with: Mandrakesoft » Mandrake Linux Corporate Server » Version: 3.0 X86 64 EditionWhen used together with: Mandrakesoft » Mandrake Linux Corporate Server » Version: 4.0 X86 64 Edition
Exploit prediction scoring system (EPSS) score for CVE-2007-4137
1.32%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 86 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2007-4137
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2007-4137
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2007-4137
-
http://www.novell.com/linux/security/advisories/2007_19_sr.html
404 Page Not Found | SUSE
-
https://bugzilla.redhat.com/show_bug.cgi?id=269001
-
ftp://patches.sgi.com/support/free/security/advisories/20070901-01-P.asc
-
http://trolltech.com/company/newsroom/announcements/press.2007-09-03.7564032119
-
http://securitytracker.com/id?1018688
-
https://issues.rpath.com/browse/RPL-1751
-
http://bugs.gentoo.org/show_bug.cgi?id=192472
-
http://fedoranews.org/updates/FEDORA-2007-703.shtml
-
http://support.avaya.com/elmodocs2/security/ASA-2007-424.htm
-
http://www.vupen.com/english/advisories/2007/3144
-
http://dist.trolltech.com/developer/download/175791_4.diff
-
http://fedoranews.org/updates/FEDORA-2007-221.shtml
-
http://security.gentoo.org/glsa/glsa-200710-28.xml
-
http://security.gentoo.org/glsa/glsa-200712-08.xml
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11159
-
http://dist.trolltech.com/developer/download/175791_3.diff
-
http://www.redhat.com/support/errata/RHSA-2007-0883.html
-
http://www.securityfocus.com/bid/25657
-
http://www.debian.org/security/2007/dsa-1426
-
http://www.mandriva.com/security/advisories?name=MDKSA-2007:183
-
http://www.securityfocus.com/archive/1/481498/100/0/threaded
-
http://www.ubuntu.com/usn/usn-513-1
Jump to