CentOS 3 / 4 : qt (CESA-2006:0725)

medium Nessus Plugin ID 36520

Synopsis

The remote CentOS host is missing one or more security updates.

Description

Updated qt packages that correct an integer overflow flaw are now available.

This update has been rated as having moderate security impact by the Red Hat Security Response Team.

Qt is a software toolkit that simplifies the task of writing and maintaining GUI (Graphical User Interface) applications for the X Window System.

An integer overflow flaw was found in the way Qt handled certain pixmap images. If an application linked against Qt created a pixmap image in a certain way, it could lead to a denial of service or possibly allow the execution of arbitrary code. (CVE-2006-4811)

Users of Qt should upgrade to these updated packages, which contain a backported patch to correct this issue.

Solution

Update the affected qt packages.

See Also

http://www.nessus.org/u?4cf37801

http://www.nessus.org/u?94c3cc0f

http://www.nessus.org/u?84ef1d0d

http://www.nessus.org/u?e7d99f70

http://www.nessus.org/u?0af373ab

http://www.nessus.org/u?dd9737c2

Plugin Details

Severity: Medium

ID: 36520

File Name: centos_RHSA-2006-0725.nasl

Version: 1.15

Type: local

Agent: unix

Published: 4/23/2009

Updated: 1/4/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:centos:centos:qt-designer, p-cpe:/a:centos:centos:qt-config, cpe:/o:centos:centos:3, p-cpe:/a:centos:centos:qt-odbc, p-cpe:/a:centos:centos:qt-postgresql, p-cpe:/a:centos:centos:qt-devel, p-cpe:/a:centos:centos:qt-mysql, cpe:/o:centos:centos:4, p-cpe:/a:centos:centos:qt

Required KB Items: Host/local_checks_enabled, Host/CentOS/release, Host/CentOS/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 11/2/2006

Vulnerability Publication Date: 10/18/2006

Reference Information

CVE: CVE-2006-4811

BID: 20599

RHSA: 2006:0725