{"containers":{"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2011-08-22T00:00:00.000Z","descriptions":[{"lang":"en","value":"Buffer overflow in the TIFF reader in gui/image/qtiffhandler.cpp in Qt 4.7.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via the TIFFTAG_SAMPLESPERPIXEL tag in a greyscale TIFF image with multiple samples per pixel."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2017-08-28T12:57:01.000Z","orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat"},"references":[{"name":"46371","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/46371"},{"name":"USN-1504-1","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"http://www.ubuntu.com/usn/USN-1504-1"},{"name":"46140","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/46140"},{"name":"[oss-security] 20120824 Re: CVE request: libqt4: two memory issues","tags":["mailing-list","x_refsource_MLIST"],"url":"http://www.openwall.com/lists/oss-security/2011/08/24/8"},{"name":"GLSA-201206-02","tags":["vendor-advisory","x_refsource_GENTOO"],"url":"http://security.gentoo.org/glsa/glsa-201206-02.xml"},{"name":"openSUSE-SU-2011:1119","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-updates/2011-10/msg00007.html"},{"name":"46410","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/46410"},{"name":"qt-grayscale-bo(69975)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/69975"},{"name":"[oss-security] 20120822 CVE request: libqt4: two memory issues","tags":["mailing-list","x_refsource_MLIST"],"url":"http://www.openwall.com/lists/oss-security/2011/08/22/6"},{"tags":["x_refsource_CONFIRM"],"url":"https://qt.gitorious.org/qt/qt/commit/cb6380beb81ab9571c547270c144988781fed465"},{"name":"46128","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/46128"},{"name":"46187","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/46187"},{"name":"49895","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/49895"},{"tags":["x_refsource_MISC"],"url":"https://bugzilla.novell.com/show_bug.cgi?id=637275"},{"name":"49383","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/49383"},{"name":"49724","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/49724"},{"name":"FEDORA-2011-12145","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066209.html"},{"name":"RHSA-2011:1323","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://rhn.redhat.com/errata/RHSA-2011-1323.html"},{"name":"SUSE-SU-2011:1113","tags":["vendor-advisory","x_refsource_SUSE"],"url":"https://hermes.opensuse.org/messages/12056605"},{"name":"RHSA-2011:1328","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://rhn.redhat.com/errata/RHSA-2011-1328.html"},{"name":"75653","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://www.osvdb.org/75653"},{"name":"openSUSE-SU-2011:1120","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-updates/2011-10/msg00008.html"}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-06T23:29:56.371Z"},"title":"CVE Program Container","references":[{"name":"46371","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/46371"},{"name":"USN-1504-1","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"http://www.ubuntu.com/usn/USN-1504-1"},{"name":"46140","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/46140"},{"name":"[oss-security] 20120824 Re: CVE request: libqt4: two memory issues","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2011/08/24/8"},{"name":"GLSA-201206-02","tags":["vendor-advisory","x_refsource_GENTOO","x_transferred"],"url":"http://security.gentoo.org/glsa/glsa-201206-02.xml"},{"name":"openSUSE-SU-2011:1119","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-updates/2011-10/msg00007.html"},{"name":"46410","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/46410"},{"name":"qt-grayscale-bo(69975)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/69975"},{"name":"[oss-security] 20120822 CVE request: libqt4: two memory issues","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2011/08/22/6"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://qt.gitorious.org/qt/qt/commit/cb6380beb81ab9571c547270c144988781fed465"},{"name":"46128","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/46128"},{"name":"46187","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/46187"},{"name":"49895","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/49895"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://bugzilla.novell.com/show_bug.cgi?id=637275"},{"name":"49383","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/49383"},{"name":"49724","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/49724"},{"name":"FEDORA-2011-12145","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066209.html"},{"name":"RHSA-2011:1323","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2011-1323.html"},{"name":"SUSE-SU-2011:1113","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"https://hermes.opensuse.org/messages/12056605"},{"name":"RHSA-2011:1328","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2011-1328.html"},{"name":"75653","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://www.osvdb.org/75653"},{"name":"openSUSE-SU-2011:1120","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-updates/2011-10/msg00008.html"}]}]},"cveMetadata":{"assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","cveId":"CVE-2011-3194","datePublished":"2012-06-16T00:00:00.000Z","dateReserved":"2011-08-19T00:00:00.000Z","dateUpdated":"2024-08-06T23:29:56.371Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}