CVE-2013-0254
CVE information
Published
Last Modified
CVSSv2.0 Severity
Impact Analysis
Description
The QSharedMemory class in Qt 5.0.0, 4.8.x before 4.8.5, 4.7.x before 4.7.6, and other versions including 4.4.0 uses weak permissions (world-readable and world-writable) for shared memory segments, which allows local users to read sensitive information or modify critical program data, as demonstrated by reading a pixmap being sent to an X server..
CVSSv2.0 Score
- Severity
- Low
- Base Score
- 3.6/10
- Exploit Score
- 3.9/10
- Access Vector
- Local
- Access Complexity
- Low
- Authentication Required
- None
- Impact Score
- 4.9/10
- Confidentiality Impact
- Partial
- Availability Impact
- None
- Integrity Impact
- Partial
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:a:qt:qt:1.41:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:qt:qt:1.44:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:qt:qt:1.45:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:qt:qt:1.42:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:qt:qt:1.43:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:qt:qt:2.0.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:qt:qt:2.0.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:qt:qt:2.0.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:qt:qt:3.3.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:qt:qt:3.3.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:qt:qt:3.3.4:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:qt:qt:3.3.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:qt:qt:3.3.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:qt:qt:3.3.5:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:qt:qt:3.3.6:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:qt:qt:4.0.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:qt:qt:4.1.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:qt:qt:4.1.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:qt:qt:4.1.4:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:qt:qt:4.1.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:qt:qt:4.1.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:qt:qt:4.1.5:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:qt:qt:4.0.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:qt:qt:4.2.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:qt:qt:4.2.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:qt:qt:4.2.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:qt:qt:4.3.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:qt:qt:4.3.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:qt:qt:4.3.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:qt:qt:4.3.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:qt:qt:4.3.4:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:qt:qt:4.3.5:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:qt:qt:4.4.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:qt:qt:4.4.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:qt:qt:4.4.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:qt:qt:4.4.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:qt:qt:4.5.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:qt:qt:4.5.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:qt:qt:4.5.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:qt:qt:4.5.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:qt:qt:4.6.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:qt:qt:4.6.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:qt:qt:4.6.4:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:qt:qt:4.6.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:qt:qt:4.6.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:qt:qt:4.6.5:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:qt:qt:4.7.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:qt:qt:4.7.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:qt:qt:4.7.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:qt:qt:4.7.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:qt:qt:4.7.5:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:qt:qt:4.7.4:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:qt:qt:4.7.6:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:qt:qt:4.8.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:qt:qt:4.8.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:qt:qt:4.8.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:qt:qt:4.8.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:qt:qt:4.8.4:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:qt:qt:4.8.5:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:qt:qt:5.0.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:qt:qt:5.0.0:*:*:*:*:*:*:* |
Yes
|
- | - |
References
- https://bugzilla.redhat.com/show_bug.cgi?id=907425
- http://lists.qt-project.org/pipermail/announce/2013-February/000023.html
- http://lists.opensuse.org/opensuse-updates/2013-03/msg00019.html
- http://lists.opensuse.org/opensuse-updates/2013-03/msg00014.html
- http://lists.opensuse.org/opensuse-updates/2013-03/msg00015.html
- http://rhn.redhat.com/errata/RHSA-2013-0669.html
Scan your vulnerabilities for free. Start using Mageni today.
Mageni can help you to find, assess and manage your vulnerabilities.
Get Started for Free