U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2007-0242 Detail

Description

The UTF-8 decoder in codecs/qutfcodec.cpp in Qt 3.3.8 and 4.2.3 does not reject long UTF-8 sequences as required by the standard, which allows remote attackers to conduct cross-site scripting (XSS) and directory traversal attacks via long sequences that decode to dangerous metacharacters.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
ftp://patches.sgi.com/support/free/security/advisories/20070901-01-P.asc
ftp://patches.sgi.com/support/free/security/advisories/20070901-01-P.asc
http://fedoranews.org/updates/FEDORA-2007-703.shtml
http://fedoranews.org/updates/FEDORA-2007-703.shtml
http://rhn.redhat.com/errata/RHSA-2011-1324.html
http://rhn.redhat.com/errata/RHSA-2011-1324.html
http://secunia.com/advisories/24699
http://secunia.com/advisories/24699
http://secunia.com/advisories/24705
http://secunia.com/advisories/24705
http://secunia.com/advisories/24726
http://secunia.com/advisories/24726
http://secunia.com/advisories/24727
http://secunia.com/advisories/24727
http://secunia.com/advisories/24759
http://secunia.com/advisories/24759
http://secunia.com/advisories/24797
http://secunia.com/advisories/24797
http://secunia.com/advisories/24847
http://secunia.com/advisories/24847
http://secunia.com/advisories/24889
http://secunia.com/advisories/24889
http://secunia.com/advisories/25263
http://secunia.com/advisories/25263
http://secunia.com/advisories/26804
http://secunia.com/advisories/26804
http://secunia.com/advisories/26857
http://secunia.com/advisories/26857
http://secunia.com/advisories/27108
http://secunia.com/advisories/27108
http://secunia.com/advisories/27275
http://secunia.com/advisories/27275
http://secunia.com/advisories/46117
http://secunia.com/advisories/46117
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.348591
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.348591
http://support.avaya.com/elmodocs2/security/ASA-2007-424.htm
http://support.avaya.com/elmodocs2/security/ASA-2007-424.htm
http://support.novell.com/techcenter/psdb/39ea4b325a7da742cb8b6995fa585b14.html
http://support.novell.com/techcenter/psdb/39ea4b325a7da742cb8b6995fa585b14.html
http://support.novell.com/techcenter/psdb/fc79b7f48d739f9c803a24ddad933384.html
http://support.novell.com/techcenter/psdb/fc79b7f48d739f9c803a24ddad933384.html
http://www.debian.org/security/2007/dsa-1292
http://www.debian.org/security/2007/dsa-1292
http://www.mandriva.com/security/advisories?name=MDKSA-2007:074
http://www.mandriva.com/security/advisories?name=MDKSA-2007:074
http://www.mandriva.com/security/advisories?name=MDKSA-2007:075
http://www.mandriva.com/security/advisories?name=MDKSA-2007:075
http://www.mandriva.com/security/advisories?name=MDKSA-2007:076
http://www.mandriva.com/security/advisories?name=MDKSA-2007:076
http://www.nabble.com/Bug-417390:-CVE-2007-0242%2C--Qt-UTF-8-overlong-sequence-decoding-vulnerability-t3506065.html
http://www.nabble.com/Bug-417390:-CVE-2007-0242%2C--Qt-UTF-8-overlong-sequence-decoding-vulnerability-t3506065.html
http://www.novell.com/linux/security/advisories/2007_6_sr.html
http://www.novell.com/linux/security/advisories/2007_6_sr.html
http://www.redhat.com/support/errata/RHSA-2007-0883.html
http://www.redhat.com/support/errata/RHSA-2007-0883.html
http://www.redhat.com/support/errata/RHSA-2007-0909.html
http://www.redhat.com/support/errata/RHSA-2007-0909.html
http://www.securityfocus.com/bid/23269
http://www.securityfocus.com/bid/23269
http://www.trolltech.com/company/newsroom/announcements/press.2007-03-30.9172215350 Patch 
http://www.trolltech.com/company/newsroom/announcements/press.2007-03-30.9172215350 Patch 
http://www.ubuntu.com/usn/usn-452-1
http://www.ubuntu.com/usn/usn-452-1
http://www.vupen.com/english/advisories/2007/1212
http://www.vupen.com/english/advisories/2007/1212
https://exchange.xforce.ibmcloud.com/vulnerabilities/33397
https://exchange.xforce.ibmcloud.com/vulnerabilities/33397
https://issues.rpath.com/browse/RPL-1202
https://issues.rpath.com/browse/RPL-1202
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11510
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11510

Weakness Enumeration

CWE-ID CWE Name Source
NVD-CWE-Other Other cwe source acceptance level NIST  

Known Affected Software Configurations Switch to CPE 2.2

CPEs loading, please wait.

Denotes Vulnerable Software
Are we missing a CPE here? Please let us know.

Change History

6 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2007-0242
NVD Published Date:
04/03/2007
NVD Last Modified:
11/20/2024
Source:
MITRE