First published: Fri Mar 04 2005(Updated: )
Qt before 3.3.4 searches the BUILD_PREFIX directory, which could be world-writable, to load shared libraries regardless of the LD_LIBRARY_PATH environment variable, which allows local users to execute arbitrary programs.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Trolltech Qt | =3.1.1 | |
Trolltech Qt | =3.1.2 | |
Trolltech Qt | =3.3.0 | |
Trolltech Qt | =3.0.3 | |
Trolltech Qt | =3.3.1 | |
Trolltech Qt | =3.0.5 | |
Trolltech Qt | =3.0 | |
Trolltech Qt | =3.2.3 | |
Trolltech Qt | =3.2.1 | |
Trolltech Qt | =3.3.3 | |
Trolltech Qt | =3.3.2 | |
Trolltech Qt | =3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-0627 is considered a high-severity vulnerability due to the potential for local users to execute arbitrary programs.
To fix CVE-2005-0627, upgrade to Qt version 3.3.4 or later.
CVE-2005-0627 affects multiple versions of the Qt framework prior to 3.3.4.
No, CVE-2005-0627 is a local vulnerability that requires local access to exploit.
Exploiting CVE-2005-0627 allows an attacker to execute arbitrary code on the system, leading to a compromise of system integrity.