fkie_cve-2013-0254
Vulnerability from fkie_nvd
Published
2013-02-06 12:05
Modified
2025-04-11 00:51
Severity ?
Summary
The QSharedMemory class in Qt 5.0.0, 4.8.x before 4.8.5, 4.7.x before 4.7.6, and other versions including 4.4.0 uses weak permissions (world-readable and world-writable) for shared memory segments, which allows local users to read sensitive information or modify critical program data, as demonstrated by reading a pixmap being sent to an X server.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| qt | qt | 1.41 | |
| qt | qt | 1.42 | |
| qt | qt | 1.43 | |
| qt | qt | 1.44 | |
| qt | qt | 1.45 | |
| qt | qt | 2.0.0 | |
| qt | qt | 2.0.1 | |
| qt | qt | 2.0.2 | |
| qt | qt | 3.3.0 | |
| qt | qt | 3.3.1 | |
| qt | qt | 3.3.2 | |
| qt | qt | 3.3.3 | |
| qt | qt | 3.3.4 | |
| qt | qt | 3.3.5 | |
| qt | qt | 3.3.6 | |
| qt | qt | 4.0.0 | |
| qt | qt | 4.0.1 | |
| qt | qt | 4.1.0 | |
| qt | qt | 4.1.1 | |
| qt | qt | 4.1.2 | |
| qt | qt | 4.1.3 | |
| qt | qt | 4.1.4 | |
| qt | qt | 4.1.5 | |
| qt | qt | 4.2.0 | |
| qt | qt | 4.2.1 | |
| qt | qt | 4.2.3 | |
| qt | qt | 4.3.0 | |
| qt | qt | 4.3.1 | |
| qt | qt | 4.3.2 | |
| qt | qt | 4.3.3 | |
| qt | qt | 4.3.4 | |
| qt | qt | 4.3.5 | |
| qt | qt | 4.4.0 | |
| qt | qt | 4.4.1 | |
| qt | qt | 4.4.2 | |
| qt | qt | 4.4.3 | |
| qt | qt | 4.5.0 | |
| qt | qt | 4.5.1 | |
| qt | qt | 4.5.2 | |
| qt | qt | 4.5.3 | |
| qt | qt | 4.6.0 | |
| qt | qt | 4.6.1 | |
| qt | qt | 4.6.2 | |
| qt | qt | 4.6.3 | |
| qt | qt | 4.6.4 | |
| qt | qt | 4.6.5 | |
| qt | qt | 4.7.0 | |
| qt | qt | 4.7.1 | |
| qt | qt | 4.7.2 | |
| qt | qt | 4.7.3 | |
| qt | qt | 4.7.4 | |
| qt | qt | 4.7.5 | |
| qt | qt | 4.7.6 | |
| qt | qt | 4.8.0 | |
| qt | qt | 4.8.1 | |
| qt | qt | 4.8.2 | |
| qt | qt | 4.8.3 | |
| qt | qt | 4.8.4 | |
| qt | qt | 4.8.5 | |
| qt | qt | 5.0.0 | |
| qt | qt | 5.0.1 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:qt:qt:1.41:*:*:*:*:*:*:*",
"matchCriteriaId": "57FBB4FA-43C6-432F-94FD-BAADF4DD7CB8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:qt:qt:1.42:*:*:*:*:*:*:*",
"matchCriteriaId": "30245B99-C5CB-4FDA-B70F-2CB7FA7BDF43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:qt:qt:1.43:*:*:*:*:*:*:*",
"matchCriteriaId": "EA9FC7F3-02BD-485A-AA1B-C5067F384683",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:qt:qt:1.44:*:*:*:*:*:*:*",
"matchCriteriaId": "DBA3424C-8257-445D-A9DC-1CD562651DFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:qt:qt:1.45:*:*:*:*:*:*:*",
"matchCriteriaId": "D954A35A-9BB8-4415-910D-C4AAEA2F5664",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:qt:qt:2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "67C5548D-2A34-4AAE-A43F-373D4C7F5B4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:qt:qt:2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "90E4F51F-52B4-4AB9-926C-EEDAC2052E34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:qt:qt:2.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2D6D3319-130D-49BF-8395-90E9F4D8583C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:qt:qt:3.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "52D26BBF-106F-48C8-9D57-CF080486DB64",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:qt:qt:3.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "026716CE-6BA5-4FC4-8BD3-BF5430DEBE99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:qt:qt:3.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "52BF63BD-E6FA-49AA-9627-7EDAD7939531",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:qt:qt:3.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "27EBEAE0-C1DF-46E4-9E2A-B333912A4950",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:qt:qt:3.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "5BCDBB15-4E26-48F0-A266-CA059CFEE596",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:qt:qt:3.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "A07F27DC-47A4-4EF2-91CC-81863D015B3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:qt:qt:3.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "58E53D3A-665D-4EEE-82EF-4EDBD194B475",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:qt:qt:4.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C966DAAB-74E1-4594-9CE7-5A1A60F5061E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:qt:qt:4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D51BFA7D-281E-49ED-9A4B-60AD5143C4EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:qt:qt:4.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5A38B91E-698F-4638-BC3B-BD02F3313B70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:qt:qt:4.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7629BAB0-5077-4B82-9F11-B228E8EAFA17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:qt:qt:4.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "76366D45-3604-49D1-BD97-8A9FACEA2171",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:qt:qt:4.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "EEEF60A1-5FF0-465F-A872-62F80899F870",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:qt:qt:4.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "4D5386EE-376B-4773-8687-5314BFF35E41",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:qt:qt:4.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "4ACE447E-BFBC-4059-9786-F8E5F512AEAA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:qt:qt:4.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E3AC6465-B459-410E-A5C5-EBFF5C866009",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:qt:qt:4.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EF48233D-EFFE-40A1-B50A-F2184D9CF325",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:qt:qt:4.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "610017B4-3C0A-4A59-82A1-4E20BCF786E6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:qt:qt:4.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D848BD49-3C88-4458-B8AB-AAD8DEB790BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:qt:qt:4.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0A12D978-B6FF-4C67-97D4-91A285C47813",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:qt:qt:4.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7DBD073E-F3E0-4273-81E9-AF010B711F08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:qt:qt:4.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0D58ACBA-7DF3-403A-AC0E-94749383C750",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:qt:qt:4.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "59D6E752-3B2E-4A95-A76A-3326CD490EDD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:qt:qt:4.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "7A27E4EC-9573-4C82-9B78-244DB0B06FA4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:qt:qt:4.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "678A25E8-57E3-4E0C-9B24-C68F11F108BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:qt:qt:4.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D16BB8CE-3871-4DFA-84BB-C089894437D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:qt:qt:4.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "965B37FD-E22F-4AA7-BDC2-147A9962CFD5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:qt:qt:4.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "FEE12FD7-2FB2-444A-A660-86294646F8A1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:qt:qt:4.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EA4B9F55-4BFF-4FD3-A8BC-842B0467DCD5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:qt:qt:4.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9DA805A7-7C62-49FD-B9A2-F81C981691C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:qt:qt:4.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D5596442-5608-439B-8BE6-53A70F20C079",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:qt:qt:4.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "29FD745E-4B61-417F-BC66-386877E75351",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:qt:qt:4.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2B74E5F5-CEE1-47B1-BE84-7F1C45D4FDD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:qt:qt:4.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "874E217C-98AC-4F0B-B120-D721164912CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:qt:qt:4.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "3051F46B-E301-4DF7-A89B-4E8495617888",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:qt:qt:4.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0C8BED3D-E6E9-4A7F-A186-DD7DC20706D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:qt:qt:4.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "1C5CFCD4-6CB1-489D-9619-B0169EA1719C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:qt:qt:4.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "510C5795-4E61-470F-BE62-A6732F4F0341",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:qt:qt:4.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5C2D2DA2-4D77-4396-97A7-D4ED0F633E19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:qt:qt:4.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1BC1BC2C-6D99-463F-9326-AF9B468E03F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:qt:qt:4.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "342A67CF-B332-46D1-A3FF-604552953C66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:qt:qt:4.7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "9239A893-506A-4853-8B00-FCDE5EC3E5DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:qt:qt:4.7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "1A6196C5-BB95-447A-B610-4765AB702F96",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:qt:qt:4.7.5:*:*:*:*:*:*:*",
"matchCriteriaId": "3E398049-C78A-452C-9FBF-E32DC86BDBD0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:qt:qt:4.7.6:*:*:*:*:*:*:*",
"matchCriteriaId": "8A505785-5597-4F5D-99A3-D143C1CCBFBD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:qt:qt:4.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B307395A-36B6-4F54-92C9-D732580F3EBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:qt:qt:4.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F9D0CB6E-5275-4D51-81F1-84D456F936B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:qt:qt:4.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "214A1125-FBE9-433D-8B05-10595CD59F24",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:qt:qt:4.8.3:*:*:*:*:*:*:*",
"matchCriteriaId": "EB7CC6B1-7E40-4D6A-94CF-7412EA3F8534",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:qt:qt:4.8.4:*:*:*:*:*:*:*",
"matchCriteriaId": "062A62AA-EC5B-4D8E-9337-D25DF4FE56FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:qt:qt:4.8.5:*:*:*:*:*:*:*",
"matchCriteriaId": "581FF62C-BD93-485C-A5BA-E5EBFEDC45C9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:qt:qt:5.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "03C7E11D-AA2C-48BB-8C50-B04E5CD3A7C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:qt:qt:5.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E30B4386-B419-46B7-945F-C04F79600708",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The QSharedMemory class in Qt 5.0.0, 4.8.x before 4.8.5, 4.7.x before 4.7.6, and other versions including 4.4.0 uses weak permissions (world-readable and world-writable) for shared memory segments, which allows local users to read sensitive information or modify critical program data, as demonstrated by reading a pixmap being sent to an X server."
},
{
"lang": "es",
"value": "La clase QSharedMemory en Qt v5.0.0, v4.8.x anterior a v4.8.5, v4.7.x anterior a v4.7.6, y otras versiones incluida la v4.4.0 utiliza permisos d\u00e9biles (escritura y lectura para todos los usuarios) para segmentos de memoria compartida, lo que permite a usuarios locales leer informacion sensible o modificar datos cr\u00edticos del programa, como se demostr\u00f3 mediante la lectura de un pixmap enviado al servidor X."
}
],
"id": "CVE-2013-0254",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2013-02-06T12:05:43.647",
"references": [
{
"source": "secalert@redhat.com",
"url": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00014.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00015.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00019.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://lists.qt-project.org/pipermail/announce/2013-February/000023.html"
},
{
"source": "secalert@redhat.com",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0669.html"
},
{
"source": "secalert@redhat.com",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907425"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00014.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00015.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00019.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://lists.qt-project.org/pipermail/announce/2013-February/000023.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0669.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=907425"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-264"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…