Executive Summary

Summary
Title Qt vulnerabilities
Informations
Name USN-4275-1 First vendor Publication 2020-02-10
Vendor Ubuntu Last vendor Modification 2020-02-10
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:N/I:N/A:P)
Cvss Base Score 4.3 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 19.10 - Ubuntu 18.04 LTS - Ubuntu 16.04 LTS

Summary:

Several security issues were fixed in Qt.

Software Description: - qtbase-opensource-src: Qt 5 libraries

Details:

It was discovered that Qt incorrectly handled certain PPM images. If a user or automated system were tricked into opening a specially crafted PPM file, a remote attacker could cause Qt to crash, resulting in a denial of service. This issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. (CVE-2018-19872)

It was discovered that Qt incorrectly handled certain text files. If a user or automated system were tricked into opening a specially crafted text file, a remote attacker could cause Qt to crash, resulting in a denial of service. This issue only affected Ubuntu 19.10. (CVE-2019-18281)

It was discovered that Qt incorrectly searched for plugins in the current working directory. An attacker could possibly use this issue to execute arbitrary code. (CVE-2020-0569)

It was discovered that Qt incorrectly searched for libraries relative to the current working directory. An attacker could possibly use this issue to execute arbitrary code. This issue only affected Ubuntu 19.10. (CVE-2020-0570)

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 19.10:
libqt5core5a 5.12.4+dfsg-4ubuntu1.1
libqt5gui5 5.12.4+dfsg-4ubuntu1.1

Ubuntu 18.04 LTS:
libqt5core5a 5.9.5+dfsg-0ubuntu2.5
libqt5gui5 5.9.5+dfsg-0ubuntu2.5

Ubuntu 16.04 LTS:
libqt5core5a 5.5.1+dfsg-16ubuntu7.7
libqt5gui5 5.5.1+dfsg-16ubuntu7.7

After a standard system update you need to restart your session to make all the necessary changes.

References:
https://usn.ubuntu.com/4275-1
CVE-2018-19872, CVE-2019-18281, CVE-2020-0569, CVE-2020-0570

Package Information:
https://launchpad.net/ubuntu/+source/qtbase-opensource-src/5.12.4+dfsg-4ubuntu1.1
https://launchpad.net/ubuntu/+source/qtbase-opensource-src/5.9.5+dfsg-0ubuntu2.5
https://launchpad.net/ubuntu/+source/qtbase-opensource-src/5.5.1+dfsg-16ubuntu7.7

Original Source

Url : http://www.ubuntu.com/usn/USN-4275-1

CWE : Common Weakness Enumeration

% Id Name
50 % CWE-369 Divide By Zero
50 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1
Application 1
Os 2
Os 3
Os 1

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2020-03-19 13:20:14
  • First insertion