First published: Tue Dec 04 2012(Updated: )
An information disclosure flaw was found in the way XMLHttpRequest object implementation in Qt, a software toolkit for developing applications, performed management of certain HTTP responses. Previous implementation allowed redirection from HTTP protocol to file schemas. Also the redirection handling was performed automatically by QML application and could not be disabled. A remote attacker could use this flaw to cause QML application in an unauthorized way to read local file content by causing the HTTP response for the application to be a redirect to a file: URL (file scheme). References: [1] <a href="http://lists.qt-project.org/pipermail/announce/2012-November/000014.html">http://lists.qt-project.org/pipermail/announce/2012-November/000014.html</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/Qt | <4.8.4 | 4.8.4 |
Qt | <=4.8.3 | |
Qt | =1.41 | |
Qt | =1.42 | |
Qt | =1.43 | |
Qt | =1.44 | |
Qt | =1.45 | |
Qt | =2.0.0 | |
Qt | =2.0.1 | |
Qt | =2.0.2 | |
Qt | =3.3.0 | |
Qt | =3.3.1 | |
Qt | =3.3.2 | |
Qt | =3.3.3 | |
Qt | =3.3.4 | |
Qt | =3.3.5 | |
Qt | =3.3.6 | |
Qt | =4.0.0 | |
Qt | =4.0.1 | |
Qt | =4.1.0 | |
Qt | =4.1.1 | |
Qt | =4.1.2 | |
Qt | =4.1.3 | |
Qt | =4.1.4 | |
Qt | =4.1.5 | |
Qt | =4.2.0 | |
Qt | =4.2.1 | |
Qt | =4.2.3 | |
Qt | =4.3.0 | |
Qt | =4.3.1 | |
Qt | =4.3.2 | |
Qt | =4.3.3 | |
Qt | =4.3.4 | |
Qt | =4.3.5 | |
Qt | =4.4.0 | |
Qt | =4.4.1 | |
Qt | =4.4.2 | |
Qt | =4.4.3 | |
Qt | =4.5.0 | |
Qt | =4.5.1 | |
Qt | =4.5.2 | |
Qt | =4.5.3 | |
Qt | =4.6.0 | |
Qt | =4.6.0-rc1 | |
Qt | =4.6.1 | |
Qt | =4.6.2 | |
Qt | =4.6.3 | |
Qt | =4.6.4 | |
Qt | =4.6.5 | |
Qt | =4.6.5-rc | |
Qt | =4.7.0 | |
Qt | =4.7.1 | |
Qt | =4.7.2 | |
Qt | =4.7.3 | |
Qt | =4.7.4 | |
Qt | =4.7.5 | |
Qt | =4.7.6 | |
Qt | =4.7.6-rc | |
Qt | =4.8.0 | |
Qt | =4.8.1 | |
Qt | =4.8.2 | |
Ubuntu Linux | =10.04 | |
Ubuntu Linux | =11.10 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =12.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-5624 has a moderate severity rating due to its potential for information disclosure.
To fix CVE-2012-5624, update to the latest version of Qt beyond 4.8.4 or apply any available patches.
CVE-2012-5624 affects Qt versions up to and including 4.8.4 and several earlier versions.
CVE-2012-5624 is an information disclosure vulnerability that involves improper management of HTTP responses.
Yes, CVE-2012-5624 can potentially allow attackers to gain unauthorized access to sensitive data through HTTP redirections.