SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Web Browser)  >   KDE Konqueror Vendors:   KDE.org
KDE Konqueror Integer Overflow in Processing Pixmap Images May Let Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1017084
SecurityTracker URL:  http://securitytracker.com/id/1017084
CVE Reference:   CVE-2006-4811   (Links to External Site)
Date:  Oct 18 2006
Impact:   Execution of arbitrary code via network, User access via network


Description:   A vulnerability was reported in KDE Konqueror. A remote user can cause arbitrary code to be executed on the target user's system.

A remote user can create a specially crafted pixmap image file that, when loaded by the target user, will trigger an integer overflow and execute arbitrary code on the target system. The code will run with the privileges of the target user.

The vulnerability resides in a Qt library function.

Georgi Guninski reported this vulnerability.

Impact:   A remote user can create an image that, when loaded by the target user, will execute arbitrary code on the target user's system.
Solution:   No upstream solution was available at the time of this entry.
Vendor URL:  www.kde.org/ (Links to External Site)
Cause:   Boundary error
Underlying OS:  Linux (Any), UNIX (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Oct 18 2006 (Red Hat Issues Fix) KDE Konqueror Integer Overflow in Processing Pixmap Images May Let Remote Users Execute Arbitrary Code
Red Hat has released a fix for Red Hat Enterprise Linux 2.1, 3, and 4.
Nov 1 2006 (Red Hat Issues Fix for Qt) KDE Konqueror Integer Overflow in Processing Pixmap Images May Let Remote Users Execute Arbitrary Code
Red Hat has released a fix for Qt on Red Hat Enterprise Linux 2.1, 3, and 4.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC