{ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2007-4137", "STATE" : "PUBLIC" }, "affects" : { "vendor" : { "vendor_data" : [ { "product" : { "product_data" : [ { "product_name" : "n/a", "version" : { "version_data" : [ { "version_value" : "n/a" } ] } } ] }, "vendor_name" : "n/a" } ] } }, "data_format" : "MITRE", "data_type" : "CVE", "data_version" : "4.0", "description" : { "description_data" : [ { "lang" : "eng", "value" : "Off-by-one error in the QUtf8Decoder::toUnicode function in Trolltech Qt 3 allows context-dependent attackers to cause a denial of service (crash) via a crafted Unicode string that triggers a heap-based buffer overflow. NOTE: Qt 4 has the same error in the QUtf8Codec::convertToUnicode function, but it is not exploitable." } ] }, "problemtype" : { "problemtype_data" : [ { "description" : [ { "lang" : "eng", "value" : "n/a" } ] } ] }, "references" : { "reference_data" : [ { "name" : "20071004 FLEA-2007-0059-1 qt qt-tools", "refsource" : "BUGTRAQ", "url" : "http://www.securityfocus.com/archive/1/481498/100/0/threaded" }, { "name" : "http://dist.trolltech.com/developer/download/175791_3.diff", "refsource" : "MISC", "url" : "http://dist.trolltech.com/developer/download/175791_3.diff" }, { "name" : "http://dist.trolltech.com/developer/download/175791_4.diff", "refsource" : "MISC", "url" : "http://dist.trolltech.com/developer/download/175791_4.diff" }, { "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=269001", "refsource" : "MISC", "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=269001" }, { "name" : "http://trolltech.com/company/newsroom/announcements/press.2007-09-03.7564032119", "refsource" : "CONFIRM", "url" : "http://trolltech.com/company/newsroom/announcements/press.2007-09-03.7564032119" }, { "name" : "https://issues.rpath.com/browse/RPL-1751", "refsource" : "CONFIRM", "url" : "https://issues.rpath.com/browse/RPL-1751" }, { "name" : "http://support.avaya.com/elmodocs2/security/ASA-2007-424.htm", "refsource" : "CONFIRM", "url" : "http://support.avaya.com/elmodocs2/security/ASA-2007-424.htm" }, { "name" : "http://bugs.gentoo.org/show_bug.cgi?id=192472", "refsource" : "CONFIRM", "url" : "http://bugs.gentoo.org/show_bug.cgi?id=192472" }, { "name" : "DSA-1426", "refsource" : "DEBIAN", "url" : "http://www.debian.org/security/2007/dsa-1426" }, { "name" : "FEDORA-2007-2216", "refsource" : "FEDORA", "url" : "http://fedoranews.org/updates/FEDORA-2007-221.shtml" }, { "name" : "FEDORA-2007-703", "refsource" : "FEDORA", "url" : "http://fedoranews.org/updates/FEDORA-2007-703.shtml" }, { "name" : "GLSA-200710-28", "refsource" : "GENTOO", "url" : "http://security.gentoo.org/glsa/glsa-200710-28.xml" }, { "name" : "GLSA-200712-08", "refsource" : "GENTOO", "url" : "http://security.gentoo.org/glsa/glsa-200712-08.xml" }, { "name" : "MDKSA-2007:183", "refsource" : "MANDRIVA", "url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2007:183" }, { "name" : "RHSA-2007:0883", "refsource" : "REDHAT", "url" : "http://www.redhat.com/support/errata/RHSA-2007-0883.html" }, { "name" : "20070901-01-P", "refsource" : "SGI", "url" : "ftp://patches.sgi.com/support/free/security/advisories/20070901-01-P.asc" }, { "name" : "SUSE-SR:2007:019", "refsource" : "SUSE", "url" : "http://www.novell.com/linux/security/advisories/2007_19_sr.html" }, { "name" : "USN-513-1", "refsource" : "UBUNTU", "url" : "http://www.ubuntu.com/usn/usn-513-1" }, { "name" : "25657", "refsource" : "BID", "url" : "http://www.securityfocus.com/bid/25657" }, { "name" : "oval:org.mitre.oval:def:11159", "refsource" : "OVAL", "url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11159" }, { "name" : "ADV-2007-3144", "refsource" : "VUPEN", "url" : "http://www.vupen.com/english/advisories/2007/3144" }, { "name" : "39384", "refsource" : "OSVDB", "url" : "http://osvdb.org/39384" }, { "name" : "1018688", "refsource" : "SECTRACK", "url" : "http://securitytracker.com/id?1018688" }, { "name" : "26778", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/26778" }, { "name" : "26782", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/26782" }, { "name" : "26811", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/26811" }, { "name" : "26857", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/26857" }, { "name" : "26804", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/26804" }, { "name" : "26868", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/26868" }, { "name" : "26882", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/26882" }, { "name" : "27053", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/27053" }, { "name" : "26987", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/26987" }, { "name" : "27275", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/27275" }, { "name" : "27382", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/27382" }, { "name" : "27996", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/27996" }, { "name" : "28021", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/28021" } ] } }