Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

CVE ID:CVE-2006-4811
Description:Integer overflow in Qt 3.3 before 3.3.7, 4.1 before 4.1.5, and 4.2 before 4.2.1, as used in the KDE khtml library, kdelibs 3.1.3, and possibly other packages, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted pixmap image.
Test IDs: 1.3.6.1.4.1.25623.1.0.57544   1.3.6.1.4.1.25623.1.0.57551   1.3.6.1.4.1.25623.1.0.65518   1.3.6.1.4.1.25623.1.0.62483   1.3.6.1.4.1.25623.1.0.62481   1.3.6.1.4.1.25623.1.0.58065   1.3.6.1.4.1.25623.1.0.57529   1.3.6.1.4.1.25623.1.0.57618   1.3.6.1.4.1.25623.1.1.12.2006.368.1   1.3.6.1.4.1.25623.1.0.57619   1.3.6.1.4.1.25623.1.0.57562   1.3.6.1.4.1.25623.1.0.57915   1.3.6.1.4.1.25623.1.0.62480   1.3.6.1.4.1.25623.1.0.57570   1.3.6.1.4.1.25623.1.0.57549   1.3.6.1.4.1.25623.1.0.62479   1.3.6.1.4.1.25623.1.0.57522   1.3.6.1.4.1.25623.1.0.57697  
Cross References: Common Vulnerability Exposure (CVE) ID: CVE-2006-4811
1017084
http://securitytracker.com/id?1017084
20061002-01-P
ftp://patches.sgi.com/support/free/security/advisories/20061002-01-P
20061018 rPSA-2006-0195-1 kdelibs
http://www.securityfocus.com/archive/1/449173/100/0/threaded
20061101-01-P
ftp://patches.sgi.com/support/free/security/advisories/20061101-01-P
20599
http://www.securityfocus.com/bid/20599
22380
http://secunia.com/advisories/22380
22397
http://secunia.com/advisories/22397
22479
http://secunia.com/advisories/22479
22485
http://secunia.com/advisories/22485
22492
http://secunia.com/advisories/22492
22520
http://secunia.com/advisories/22520
22579
http://secunia.com/advisories/22579
22586
http://secunia.com/advisories/22586
22589
http://secunia.com/advisories/22589
22645
http://secunia.com/advisories/22645
22738
http://secunia.com/advisories/22738
22890
http://secunia.com/advisories/22890
22929
http://secunia.com/advisories/22929
24347
http://secunia.com/advisories/24347
ADV-2006-4099
http://www.vupen.com/english/advisories/2006/4099
DSA-1200
http://www.us.debian.org/security/2006/dsa-1200
GLSA-200611-02
http://security.gentoo.org/glsa/glsa-200611-02.xml
GLSA-200703-06
http://security.gentoo.org/glsa/glsa-200703-06.xml
MDKSA-2006:186
http://www.mandriva.com/security/advisories?name=MDKSA-2006:186
MDKSA-2006:187
http://www.mandriva.com/security/advisories?name=MDKSA-2006:187
RHSA-2006:0720
http://www.redhat.com/support/errata/RHSA-2006-0720.html
RHSA-2006:0725
http://www.redhat.com/support/errata/RHSA-2006-0725.html
SSA:2006-298-01
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.483634
SUSE-SA:2006:063
http://lists.suse.com/archive/suse-security-announce/2006-Oct/0006.html
USN-368-1
http://www.ubuntu.com/usn/usn-368-1
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=210742
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=210742
http://www.trolltech.com/company/newsroom/announcements/press.2006-10-19.5434451733
http://www.trolltech.com/company/newsroom/announcements/press.2006-10-19.5434451733
https://issues.rpath.com/browse/RPL-723
https://issues.rpath.com/browse/RPL-723
oval:org.mitre.oval:def:10218
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10218




© 1998-2025 E-Soft Inc. All rights reserved.