Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.57697
Category:Slackware Local Security Checks
Title:Slackware: Security Advisory (SSA:2006-298-01)
Summary:The remote host is missing an update for the 'qt' package(s) announced via the SSA:2006-298-01 advisory.
Description:Summary:
The remote host is missing an update for the 'qt' package(s) announced via the SSA:2006-298-01 advisory.

Vulnerability Insight:
New qt packages are available for Slackware 10.0, 10.1, 10.2, and 11.0
to fix a possible security issue.

More details about this issue may be found in the Common
Vulnerabilities and Exposures (CVE) database:

[link moved to references]

Trolltech has put out a press release which may be found here:

[link moved to references]


Here are the details from the Slackware 11.0 ChangeLog:
+--------------------------+
patches/packages/qt-3.3.7-i486-1_slack11.0.tgz: Upgraded to qt-x11-free-3.3.7.
This fixes an issue with Qt's handling of pixmap images that causes Qt linked
applications to crash if a specially crafted malicious image is loaded.
Inspection of the code in question makes it seem unlikely that this could
lead to more serious implications (such as arbitrary code execution), but it
is recommended that users upgrade to the new Qt package.
For more information, see:
[links moved to references]
(* Security fix *)
+--------------------------+

Affected Software/OS:
'qt' package(s) on Slackware 10.0, Slackware 10.1, Slackware 10.2, Slackware 11.0.

Solution:
Please install the updated package(s).

CVSS Score:
6.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2006-4811
1017084
http://securitytracker.com/id?1017084
20061002-01-P
ftp://patches.sgi.com/support/free/security/advisories/20061002-01-P
20061018 rPSA-2006-0195-1 kdelibs
http://www.securityfocus.com/archive/1/449173/100/0/threaded
20061101-01-P
ftp://patches.sgi.com/support/free/security/advisories/20061101-01-P
20599
http://www.securityfocus.com/bid/20599
22380
http://secunia.com/advisories/22380
22397
http://secunia.com/advisories/22397
22479
http://secunia.com/advisories/22479
22485
http://secunia.com/advisories/22485
22492
http://secunia.com/advisories/22492
22520
http://secunia.com/advisories/22520
22579
http://secunia.com/advisories/22579
22586
http://secunia.com/advisories/22586
22589
http://secunia.com/advisories/22589
22645
http://secunia.com/advisories/22645
22738
http://secunia.com/advisories/22738
22890
http://secunia.com/advisories/22890
22929
http://secunia.com/advisories/22929
24347
http://secunia.com/advisories/24347
ADV-2006-4099
http://www.vupen.com/english/advisories/2006/4099
DSA-1200
http://www.us.debian.org/security/2006/dsa-1200
GLSA-200611-02
http://security.gentoo.org/glsa/glsa-200611-02.xml
GLSA-200703-06
http://security.gentoo.org/glsa/glsa-200703-06.xml
MDKSA-2006:186
http://www.mandriva.com/security/advisories?name=MDKSA-2006:186
MDKSA-2006:187
http://www.mandriva.com/security/advisories?name=MDKSA-2006:187
RHSA-2006:0720
http://www.redhat.com/support/errata/RHSA-2006-0720.html
RHSA-2006:0725
http://www.redhat.com/support/errata/RHSA-2006-0725.html
SSA:2006-298-01
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.483634
SUSE-SA:2006:063
http://lists.suse.com/archive/suse-security-announce/2006-Oct/0006.html
USN-368-1
http://www.ubuntu.com/usn/usn-368-1
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=210742
http://www.trolltech.com/company/newsroom/announcements/press.2006-10-19.5434451733
https://issues.rpath.com/browse/RPL-723
oval:org.mitre.oval:def:10218
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10218
CopyrightCopyright (C) 2012 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.