USN-1504-1: Qt vulnerabilities

Ubuntu Security Notice USN-1504-1

11th July, 2012

qt4-x11 vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 11.04
  • Ubuntu 10.04 LTS

Summary

Qt Applications could be made to crash or run programs as your login if they opened specially crafted files.

Software description

  • qt4-x11 - Qt 4 libraries

Details

It was discovered that Qt did not properly handle wildcard domain names or
IP addresses in the Common Name field of X.509 certificates. An attacker
could exploit this to perform a man in the middle attack to view sensitive
information or alter encrypted communications. This issue only affected
Ubuntu 10.04 LTS. (CVE-2010-5076)

A heap-based buffer overflow was discovered in the HarfBuzz module. If a
user were tricked into opening a crafted font file in a Qt application,
an attacker could cause a denial of service or possibly execute arbitrary
code with the privileges of the user invoking the program. (CVE-2011-3193)

It was discovered that Qt did not properly handle greyscale TIFF images.
If a Qt application could be made to process a crafted TIFF file, an
attacker could cause a denial of service. (CVE-2011-3194)

Update instructions

The problem can be corrected by updating your system to the following package version:

Ubuntu 11.04:
libqtgui4 4:4.7.2-0ubuntu6.4
libqt4-network 4:4.7.2-0ubuntu6.4
Ubuntu 10.04 LTS:
libqtgui4 4:4.6.2-0ubuntu5.4
libqt4-network 4:4.6.2-0ubuntu5.4

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to restart your session to make all
the necessary changes.

References

CVE-2010-5076, CVE-2011-3193, CVE-2011-3194