Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
CVE-2007-0242
CVE information
Published
Last Modified
CVSSv2.0 Severity
Impact Analysis
Description
The UTF-8 decoder in codecs/qutfcodec.cpp in Qt 3.3.8 and 4.2.3 does not reject long UTF-8 sequences as required by the standard, which allows remote attackers to conduct cross-site scripting (XSS) and directory traversal attacks via long sequences that decode to dangerous metacharacters..
CVSSv2.0 Score
- Severity
- Medium
- Base Score
- 4.3/10
- Exploit Score
- 8.6/10
- Access Vector
- Network
- Access Complexity
- Medium
- Authentication Required
- None
- Impact Score
- 2.9/10
- Confidentiality Impact
- None
- Availability Impact
- None
- Integrity Impact
- Partial
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:a:qt:qt:3.3.8:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:qt:qt:4.2.3:*:*:*:*:*:*:* |
Yes
|
- | - |
References
- http://www.trolltech.com/company/newsroom/announcements/press.2007-03-30.9172215350
- http://www.securityfocus.com/bid/23269
- http://secunia.com/advisories/24727
- http://secunia.com/advisories/24699
- http://secunia.com/advisories/24705
- http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-securit
- http://www.ubuntu.com/usn/usn-452-1
- http://secunia.com/advisories/24726
- http://secunia.com/advisories/24847
- http://support.novell.com/techcenter/psdb/39ea4b325a7da742cb8b6995fa585b14.html
- http://support.novell.com/techcenter/psdb/fc79b7f48d739f9c803a24ddad933384.html
- http://www.novell.com/linux/security/advisories/2007_6_sr.html
- http://secunia.com/advisories/24797
- http://secunia.com/advisories/24889
- https://issues.rpath.com/browse/RPL-1202
- http://secunia.com/advisories/24759
- http://www.debian.org/security/2007/dsa-1292
- http://secunia.com/advisories/25263
- http://support.avaya.com/elmodocs2/security/ASA-2007-424.htm
- http://fedoranews.org/updates/FEDORA-2007-703.shtml
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:074
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:075
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:076
- http://www.redhat.com/support/errata/RHSA-2007-0909.html
- http://www.redhat.com/support/errata/RHSA-2007-0883.html
- ftp://patches.sgi.com/support/free/security/advisories/20070901-01-P.asc
- http://secunia.com/advisories/26857
- http://secunia.com/advisories/26804
- http://secunia.com/advisories/27108
- http://secunia.com/advisories/27275
- http://www.vupen.com/english/advisories/2007/1212
- http://secunia.com/advisories/46117
- http://rhn.redhat.com/errata/RHSA-2011-1324.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/33397
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1
- http://www.nabble.com/Bug-417390:-CVE-2007-0242%2C--Qt-UTF-8-overlong-sequence-decoding-