First published: Tue May 12 2015(Updated: )
Multiple buffer overflows in plugins/imageformats/ico/qicohandler.cpp in the QtBase module in Qt before 4.8.7 and 5.x before 5.4.2 allow remote attackers to cause a denial of service (segmentation fault and crash) and possibly execute arbitrary code via a crafted ICO image.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fedora | =20 | |
Fedora | =21 | |
Fedora | =22 | |
Qt | <=4.8.6 | |
Trolltech Qt | =5.0.0 | |
Trolltech Qt | =5.0.1 | |
Trolltech Qt | =5.0.2 | |
Trolltech Qt | =5.1.0 | |
Trolltech Qt | =5.2.0 | |
Trolltech Qt | =5.2.1 | |
Trolltech Qt | =5.3.0 | |
Trolltech Qt | =5.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1859 has a high severity due to the potential for denial of service and arbitrary code execution.
To fix CVE-2015-1859, upgrade to Qt 4.8.7 or 5.4.2 or later versions.
The vulnerability in CVE-2015-1859 is caused by multiple buffer overflows in the ICO image handling of Qt.
CVE-2015-1859 affects all Qt versions before 4.8.7 and 5.x versions before 5.4.2.
Yes, CVE-2015-1859 can potentially allow remote attackers to execute arbitrary code via a crafted ICO image.