Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.58491
Category:Mandrake Local Security Checks
Title:Mandrake Security Advisory MDKSA-2007:151 (qt3)
Summary:NOSUMMARY
Description:Description:

The remote host is missing an update to qt3
announced via advisory MDKSA-2007:151.

A number of format string flaws have been discovered in how Qt handled
error messages by Dirk Mueller and Tracey Parry of Portcullis Computer
Security. If an application linked against Qt created an error
message from user-supplied data in a certain way, it could possibly
lead to the execution of arbitrary code or a denial of service.

This update provides packages which are patched to prevent these
issues.

Affected: 2007.0, 2007.1, Corporate 3.0, Corporate 4.0

Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

http://www.securityspace.com/smysecure/catid.html?in=MDKSA-2007:151

Risk factor : High

CVSS Score:
6.8

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2007-3388
1018485
http://securitytracker.com/id?1018485
20070801-01-P
ftp://patches.sgi.com/support/free/security/advisories/20070801-01-P.asc
20070803 FLEA-2007-0042-1 qt
http://www.securityfocus.com/archive/1/475480/30/5550/threaded
24460
http://secunia.com/advisories/24460
25154
http://www.securityfocus.com/bid/25154
26264
http://secunia.com/advisories/26264
26284
http://secunia.com/advisories/26284
26291
http://secunia.com/advisories/26291
26295
http://secunia.com/advisories/26295
26298
http://secunia.com/advisories/26298
26306
http://secunia.com/advisories/26306
26385
http://secunia.com/advisories/26385
26607
http://secunia.com/advisories/26607
26804
http://secunia.com/advisories/26804
26852
http://secunia.com/advisories/26852
26882
http://secunia.com/advisories/26882
27996
http://secunia.com/advisories/27996
28021
http://secunia.com/advisories/28021
ADV-2007-2733
http://www.vupen.com/english/advisories/2007/2733
DSA-1426
http://www.debian.org/security/2007/dsa-1426
FEDORA-2007-2216
http://fedoranews.org/updates/FEDORA-2007-221.shtml
FEDORA-2007-703
http://fedoranews.org/updates/FEDORA-2007-703.shtml
GLSA-200708-16
http://www.gentoo.org/security/en/glsa/glsa-200708-16.xml
GLSA-200710-28
http://www.gentoo.org/security/en/glsa/glsa-200710-28.xml
GLSA-200712-08
http://security.gentoo.org/glsa/glsa-200712-08.xml
MDKSA-2007:151
http://www.mandriva.com/security/advisories?name=MDKSA-2007:151
RHSA-2007:0721
http://www.redhat.com/support/errata/RHSA-2007-0721.html
SSA:2007-222-03
http://www.slackware.org/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.354168
SUSE-SA:2007:048
http://www.novell.com/linux/security/advisories/2007_48_qt3.html
USN-495-1
http://www.ubuntu.com/usn/usn-495-1
http://bugs.gentoo.org/show_bug.cgi?id=185446
http://dist.trolltech.com/developer/download/170529.diff
http://support.avaya.com/elmodocs2/security/ASA-2007-388.htm
http://trolltech.com/company/newsroom/announcements/press.2007-07-27.7503755960
https://issues.rpath.com/browse/RPL-1597
oval:org.mitre.oval:def:9690
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9690
CopyrightCopyright (c) 2007 E-Soft Inc. http://www.securityspace.com

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.