Professional OVAL Repository
[Eng]
[Rus]
[Sign-In]
OVAL
Search
Categories
RedCheck
About
OVAL Definitions
OVAL Items
FSTEC Data Bank Information Security Threats
NKCKI
EOL (End Of Life)
Linux Security Advisories
Mozilla Foundation Security Advisory
IBM
VMware
Cisco
Check Point Software Technologies
Apache
Solaris
FreeBSD
Development
GitHub Enterprise
Google Chrome Security Advisories
Oracle Security Advisories
Adobe Security Advisories
OpenSSL Security Advisories
Microsoft
CVE
CWE
CPE
Latest Updates
OS ROSA
ALT Linux
Astra Linux
RED OS
DSA (Debian Security Advisory) Patсh Statistics
DSA (Debian Security Advisory) Patсh Feed
DSA (Debian Security Advisory) Vulnerability Feed
DLA (Debian Security Advisory) Patсh Statistics
DLA (Debian Security Advisory) Patсh Feed
DLA (Debian Security Advisory) Vulnerability Feed
ALT Linux (Security Bulletins) Patсh Statistics
ALT Linux (Security Bulletins) Patсh Feed
ALT Linux (Security Bulletins) Vulnerability Feed
RED OS (Security Bulletins) Patсh Statistics
RED OS (Security Bulletins) Patсh Feed
RED OS (Security Bulletins) Vulnerability Feed
USN (Ubuntu Security Notice) Patсh Statistics
USN (Ubuntu Security Notice) Patсh Feed
USN (Ubuntu Security Notice) Vulnerability Feed
RHSA (RedHat Security Advisory) Patсh Statistics
RHSA (RedHat Security Advisory) Patсh Feed
RHSA (RedHat Security Advisory) Vulnerability Feed
ELSA (Oracle Linux Security Advisory) Patсh Statistics
ELSA (Oracle Linux Security Advisory) Patсh Feed
ELSA (Oracle Linux Security Advisory) Vulnerability Feed
SUSE (SUSE Security Advisories) Patсh Statistics
SUSE (SUSE Security Advisories) Patсh Feed
SUSE (SUSE Security Advisories) Vulnerability Feed
openSUSE (openSUSE Security Advisories) Patсh Statistics
openSUSE (openSUSE Security Advisories) Patсh Feed
openSUSE (openSUSE Security Advisories) Vulnerability Feed
Amazon Linux AMI (Security Bulletins) Patсh Statistics
Amazon Linux AMI (Security Bulletins) Patсh Feed
Amazon Linux AMI (Security Bulletins) Vulnerability Feed
Mageia Linux (Security Bulletins) Patсh Statistics
Mageia Linux (Security Bulletins) Patсh Feed
Mageia Linux (Security Bulletins) Vulnerability Feed
OS ROSA SX COBALT 1.0
OS ROSA DX COBALT 1.0
ROSA 7.3 (Security Advisories) Patсh Statistics
ROSA 7.3 (Security Advisories) Patсh Feed
ROSA 7.3 (Security Advisories) Vulnerability Feed
ALT Linux SPT 6.0
ALT Linux SPT 7.0
ALT 8 SP
ALT 9
Astra Linux SE 1.5
Astra Linux SE 1.6
Astra Linux SE 1.7
Astra Linux SE 1.8
RED OS Murom 7.1
RED OS Murom 7.2
IBM DB2
VMware Vulnerabilities Advisory (VMSA)
VMware vCenter Patch Advisories
VMware ESXi Patch Advisories
VMware NSX Patches
VMware NSX Vulnerabilities
VMware Photon OS 1.0 Patches
VMware Photon OS 1.0 Vulnerabilities
VMware Photon OS 2.0 Patches
VMware Photon OS 2.0 Vulnerabilities
Cisco ASA
Cisco IOS/NX-OS Advisory
Cisco NX-OS Vulnerabilities
Check Point Gaia
Apache Tomcat Advisories
Apache Tomcat Server
Apache HTTP Server
Python
Node.js
RubyGems
Qt
Microsoft Security Bulletin
Microsoft Knowledge Base Article
Microsoft SharePoint
Microsoft SharePoint Foundation 2013
Microsoft SharePoint Server 2013
Microsoft SharePoint Server 2016
About OVALdb
User manual
Pricing
Contact us
OVAL Definitions
>
OVAL Definition Details
Id
oval:ru.altx-soft.nix:def:56093
[Eng]
Version
3
Class
vulnerability
ALTXid
226669
Language
Russian
Severity
Medium
Title
Ubuntu -- уязвимость в qt (CVE-2007-3388)
Description
В продукте qt обнаружена уязвимость CVE-2007-3388.
Family
unix
Platform
Ubuntu 6.06
Ubuntu 6.10
Ubuntu 7.04
Product
qt
Reference
FSTEC: BDU:2015-09584
FSTEC: BDU:2015-09584
Id:
BDU:2015-09584
Reference:
https://bdu.fstec.ru/vul/2015-09584
FSTEC: BDU:2015-04977
FSTEC: BDU:2015-04977
Id:
BDU:2015-04977
Reference:
https://bdu.fstec.ru/vul/2015-04977
FSTEC: BDU:2015-04976
FSTEC: BDU:2015-04976
Id:
BDU:2015-04976
Reference:
https://bdu.fstec.ru/vul/2015-04976
FSTEC: BDU:2015-04975
FSTEC: BDU:2015-04975
Id:
BDU:2015-04975
Reference:
https://bdu.fstec.ru/vul/2015-04975
FSTEC: BDU:2015-04974
FSTEC: BDU:2015-04974
Id:
BDU:2015-04974
Reference:
https://bdu.fstec.ru/vul/2015-04974
FSTEC: BDU:2015-04973
FSTEC: BDU:2015-04973
Id:
BDU:2015-04973
Reference:
https://bdu.fstec.ru/vul/2015-04973
FSTEC: BDU:2015-04972
FSTEC: BDU:2015-04972
Id:
BDU:2015-04972
Reference:
https://bdu.fstec.ru/vul/2015-04972
FSTEC: BDU:2015-04606
FSTEC: BDU:2015-04606
Id:
BDU:2015-04606
Reference:
https://bdu.fstec.ru/vul/2015-04606
FSTEC: BDU:2015-04605
FSTEC: BDU:2015-04605
Id:
BDU:2015-04605
Reference:
https://bdu.fstec.ru/vul/2015-04605
FSTEC: BDU:2015-04604
FSTEC: BDU:2015-04604
Id:
BDU:2015-04604
Reference:
https://bdu.fstec.ru/vul/2015-04604
FSTEC: BDU:2015-04603
FSTEC: BDU:2015-04603
Id:
BDU:2015-04603
Reference:
https://bdu.fstec.ru/vul/2015-04603
FSTEC: BDU:2015-04602
FSTEC: BDU:2015-04602
Id:
BDU:2015-04602
Reference:
https://bdu.fstec.ru/vul/2015-04602
FSTEC: BDU:2015-04601
FSTEC: BDU:2015-04601
Id:
BDU:2015-04601
Reference:
https://bdu.fstec.ru/vul/2015-04601
FSTEC: BDU:2015-03018
FSTEC: BDU:2015-03018
Id:
BDU:2015-03018
Reference:
https://bdu.fstec.ru/vul/2015-03018
FSTEC: BDU:2015-03017
FSTEC: BDU:2015-03017
Id:
BDU:2015-03017
Reference:
https://bdu.fstec.ru/vul/2015-03017
FSTEC: BDU:2015-03016
FSTEC: BDU:2015-03016
Id:
BDU:2015-03016
Reference:
https://bdu.fstec.ru/vul/2015-03016
FSTEC: BDU:2015-03015
FSTEC: BDU:2015-03015
Id:
BDU:2015-03015
Reference:
https://bdu.fstec.ru/vul/2015-03015
FSTEC: BDU:2015-03014
FSTEC: BDU:2015-03014
Id:
BDU:2015-03014
Reference:
https://bdu.fstec.ru/vul/2015-03014
FSTEC: BDU:2015-03013
FSTEC: BDU:2015-03013
Id:
BDU:2015-03013
Reference:
https://bdu.fstec.ru/vul/2015-03013
FSTEC: BDU:2015-03012
FSTEC: BDU:2015-03012
Id:
BDU:2015-03012
Reference:
https://bdu.fstec.ru/vul/2015-03012
FSTEC: BDU:2015-03011
FSTEC: BDU:2015-03011
Id:
BDU:2015-03011
Reference:
https://bdu.fstec.ru/vul/2015-03011
FSTEC: BDU:2015-03010
FSTEC: BDU:2015-03010
Id:
BDU:2015-03010
Reference:
https://bdu.fstec.ru/vul/2015-03010
FSTEC: BDU:2015-03009
FSTEC: BDU:2015-03009
Id:
BDU:2015-03009
Reference:
https://bdu.fstec.ru/vul/2015-03009
FSTEC: BDU:2015-03008
FSTEC: BDU:2015-03008
Id:
BDU:2015-03008
Reference:
https://bdu.fstec.ru/vul/2015-03008
FSTEC: BDU:2015-03007
FSTEC: BDU:2015-03007
Id:
BDU:2015-03007
Reference:
https://bdu.fstec.ru/vul/2015-03007
FSTEC: BDU:2015-03006
FSTEC: BDU:2015-03006
Id:
BDU:2015-03006
Reference:
https://bdu.fstec.ru/vul/2015-03006
FSTEC: BDU:2015-03005
FSTEC: BDU:2015-03005
Id:
BDU:2015-03005
Reference:
https://bdu.fstec.ru/vul/2015-03005
FSTEC: BDU:2015-03004
FSTEC: BDU:2015-03004
Id:
BDU:2015-03004
Reference:
https://bdu.fstec.ru/vul/2015-03004
FSTEC: BDU:2015-03003
FSTEC: BDU:2015-03003
Id:
BDU:2015-03003
Reference:
https://bdu.fstec.ru/vul/2015-03003
FSTEC: BDU:2015-03002
FSTEC: BDU:2015-03002
Id:
BDU:2015-03002
Reference:
https://bdu.fstec.ru/vul/2015-03002
FSTEC: BDU:2015-03001
FSTEC: BDU:2015-03001
Id:
BDU:2015-03001
Reference:
https://bdu.fstec.ru/vul/2015-03001
FSTEC: BDU:2015-03000
FSTEC: BDU:2015-03000
Id:
BDU:2015-03000
Reference:
https://bdu.fstec.ru/vul/2015-03000
FSTEC: BDU:2015-02999
FSTEC: BDU:2015-02999
Id:
BDU:2015-02999
Reference:
https://bdu.fstec.ru/vul/2015-02999
FSTEC: BDU:2015-02998
FSTEC: BDU:2015-02998
Id:
BDU:2015-02998
Reference:
https://bdu.fstec.ru/vul/2015-02998
FSTEC: BDU:2015-02997
FSTEC: BDU:2015-02997
Id:
BDU:2015-02997
Reference:
https://bdu.fstec.ru/vul/2015-02997
FSTEC: BDU:2015-02996
FSTEC: BDU:2015-02996
Id:
BDU:2015-02996
Reference:
https://bdu.fstec.ru/vul/2015-02996
FSTEC: BDU:2015-02995
FSTEC: BDU:2015-02995
Id:
BDU:2015-02995
Reference:
https://bdu.fstec.ru/vul/2015-02995
FSTEC: BDU:2015-02994
FSTEC: BDU:2015-02994
Id:
BDU:2015-02994
Reference:
https://bdu.fstec.ru/vul/2015-02994
FSTEC: BDU:2015-02993
FSTEC: BDU:2015-02993
Id:
BDU:2015-02993
Reference:
https://bdu.fstec.ru/vul/2015-02993
FSTEC: BDU:2015-02992
FSTEC: BDU:2015-02992
Id:
BDU:2015-02992
Reference:
https://bdu.fstec.ru/vul/2015-02992
FSTEC: BDU:2015-02991
FSTEC: BDU:2015-02991
Id:
BDU:2015-02991
Reference:
https://bdu.fstec.ru/vul/2015-02991
FSTEC: BDU:2015-02990
FSTEC: BDU:2015-02990
Id:
BDU:2015-02990
Reference:
https://bdu.fstec.ru/vul/2015-02990
FSTEC: BDU:2015-02989
FSTEC: BDU:2015-02989
Id:
BDU:2015-02989
Reference:
https://bdu.fstec.ru/vul/2015-02989
FSTEC: BDU:2015-02988
FSTEC: BDU:2015-02988
Id:
BDU:2015-02988
Reference:
https://bdu.fstec.ru/vul/2015-02988
FSTEC: BDU:2015-02987
FSTEC: BDU:2015-02987
Id:
BDU:2015-02987
Reference:
https://bdu.fstec.ru/vul/2015-02987
FSTEC: BDU:2015-02986
FSTEC: BDU:2015-02986
Id:
BDU:2015-02986
Reference:
https://bdu.fstec.ru/vul/2015-02986
FSTEC: BDU:2015-02985
FSTEC: BDU:2015-02985
Id:
BDU:2015-02985
Reference:
https://bdu.fstec.ru/vul/2015-02985
CVE: CVE-2007-3388
CVE: CVE-2007-3388
Id:
CVE-2007-3388
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3388
Comment
: Multiple format string vulnerabilities in (1) qtextedit.cpp, (2) qdatatable.cpp, (3) qsqldatabase.cpp, (4) qsqlindex.cpp, (5) qsqlrecord.cpp, (6) qglobal.cpp, and (7) qsvgdevice.cpp in QTextEdit in Trolltech Qt 3 before 3.3.8 20070727 allow remote attackers to execute arbitrary code via format string specifiers in text used to compose an error message.
CVSSv2 Score:
6.8
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P
CWE:
CWE-Other ()
References:
20070801-01-P (SGI)
http://bugs.gentoo.org/show_bug.cgi?id=185446 (CONFIRM)
http://dist.trolltech.com/developer/download/170529.diff (CONFIRM)
FEDORA-2007-2216 (FEDORA)
FEDORA-2007-703 (FEDORA)
24460 (SECUNIA)
26264 (SECUNIA)
26284 (SECUNIA)
26291 (SECUNIA)
26295 (SECUNIA)
26298 (SECUNIA)
26306 (SECUNIA)
26385 (SECUNIA)
26607 (SECUNIA)
26804 (SECUNIA)
26852 (SECUNIA)
26882 (SECUNIA)
27996 (SECUNIA)
28021 (SECUNIA)
GLSA-200712-08 (GENTOO)
1018485 (SECTRACK)
http://support.avaya.com/elmodocs2/security/ASA-2007-388.htm (CONFIRM)
http://trolltech.com/company/newsroom/announcements/press.2007-07-27.7503755960 (CONFIRM)
DSA-1426 (DEBIAN)
GLSA-200708-16 (GENTOO)
GLSA-200710-28 (GENTOO)
MDKSA-2007:151 (MANDRIVA)
SUSE-SA:2007:048 (SUSE)
RHSA-2007:0721 (REDHAT)
20070803 FLEA-2007-0042-1 qt (BUGTRAQ)
25154 (BID)
SSA:2007-222-03 (SLACKWARE)
USN-495-1 (UBUNTU)
ADV-2007-2733 (VUPEN)
https://issues.rpath.com/browse/RPL-1597 (CONFIRM)
oval:org.mitre.oval:def:9690 (OVAL)
VENDOR: USN-495-1
VENDOR: USN-495-1
Id:
USN-495-1
Reference:
http://www.ubuntu.com/usn/usn-495-1/
Content available only for registered users!
ovaldb@altx-soft.com