CVE-2011-3194

Buffer overflow in the TIFF reader in gui/image/qtiffhandler.cpp in Qt 4.7.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via the TIFFTAG_SAMPLESPERPIXEL tag in a greyscale TIFF image with multiple samples per pixel.
References
Link Resource
http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066209.html
http://lists.opensuse.org/opensuse-updates/2011-10/msg00007.html
http://lists.opensuse.org/opensuse-updates/2011-10/msg00008.html
http://rhn.redhat.com/errata/RHSA-2011-1323.html
http://rhn.redhat.com/errata/RHSA-2011-1328.html
http://secunia.com/advisories/46128 Vendor Advisory
http://secunia.com/advisories/46140 Vendor Advisory
http://secunia.com/advisories/46187 Vendor Advisory
http://secunia.com/advisories/46371 Vendor Advisory
http://secunia.com/advisories/46410 Vendor Advisory
http://secunia.com/advisories/49383 Vendor Advisory
http://secunia.com/advisories/49895 Vendor Advisory
http://security.gentoo.org/glsa/glsa-201206-02.xml
http://www.openwall.com/lists/oss-security/2011/08/22/6
http://www.openwall.com/lists/oss-security/2011/08/24/8
http://www.osvdb.org/75653
http://www.securityfocus.com/bid/49724
http://www.ubuntu.com/usn/USN-1504-1
https://bugzilla.novell.com/show_bug.cgi?id=637275
https://exchange.xforce.ibmcloud.com/vulnerabilities/69975
https://hermes.opensuse.org/messages/12056605
https://qt.gitorious.org/qt/qt/commit/cb6380beb81ab9571c547270c144988781fed465
http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066209.html
http://lists.opensuse.org/opensuse-updates/2011-10/msg00007.html
http://lists.opensuse.org/opensuse-updates/2011-10/msg00008.html
http://rhn.redhat.com/errata/RHSA-2011-1323.html
http://rhn.redhat.com/errata/RHSA-2011-1328.html
http://secunia.com/advisories/46128 Vendor Advisory
http://secunia.com/advisories/46140 Vendor Advisory
http://secunia.com/advisories/46187 Vendor Advisory
http://secunia.com/advisories/46371 Vendor Advisory
http://secunia.com/advisories/46410 Vendor Advisory
http://secunia.com/advisories/49383 Vendor Advisory
http://secunia.com/advisories/49895 Vendor Advisory
http://security.gentoo.org/glsa/glsa-201206-02.xml
http://www.openwall.com/lists/oss-security/2011/08/22/6
http://www.openwall.com/lists/oss-security/2011/08/24/8
http://www.osvdb.org/75653
http://www.securityfocus.com/bid/49724
http://www.ubuntu.com/usn/USN-1504-1
https://bugzilla.novell.com/show_bug.cgi?id=637275
https://exchange.xforce.ibmcloud.com/vulnerabilities/69975
https://hermes.opensuse.org/messages/12056605
https://qt.gitorious.org/qt/qt/commit/cb6380beb81ab9571c547270c144988781fed465
Configurations

Configuration 1 (hide)

cpe:2.3:a:qt:qt:4.7.4:*:*:*:*:*:*:*

History

No history.

Information

Published : 2012-06-16 00:55

Updated : 2025-04-11 00:51


NVD link : CVE-2011-3194

Mitre link : CVE-2011-3194

CVE.ORG link : CVE-2011-3194


JSON object : View

Products Affected

qt

  • qt
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer