Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 5 |
CVE-ID | CVE-2018-15518 CVE-2018-19870 CVE-2018-19873 CVE-2018-19869 CVE-2018-19871 |
CWE-ID | CWE-611 CWE-476 CWE-119 CWE-400 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
Fedora Operating systems & Components / Operating system mingw-sip Operating systems & Components / Operating system package or component mingw-qt5-qtxmlpatterns Operating systems & Components / Operating system package or component mingw-qt5-qtwinextras Operating systems & Components / Operating system package or component mingw-qt5-qtwebsockets Operating systems & Components / Operating system package or component mingw-qt5-qtwebkit Operating systems & Components / Operating system package or component mingw-qt5-qttranslations Operating systems & Components / Operating system package or component mingw-qt5-qttools Operating systems & Components / Operating system package or component mingw-qt5-qtsvg Operating systems & Components / Operating system package or component mingw-qt5-qtserialport Operating systems & Components / Operating system package or component mingw-qt5-qtsensors Operating systems & Components / Operating system package or component mingw-qt5-qtscript Operating systems & Components / Operating system package or component mingw-qt5-qtquickcontrols Operating systems & Components / Operating system package or component mingw-qt5-qtmultimedia Operating systems & Components / Operating system package or component mingw-qt5-qtlocation Operating systems & Components / Operating system package or component mingw-qt5-qtimageformats Operating systems & Components / Operating system package or component mingw-qt5-qtgraphicaleffects Operating systems & Components / Operating system package or component mingw-qt5-qtdeclarative Operating systems & Components / Operating system package or component mingw-qt5-qtcharts Operating systems & Components / Operating system package or component mingw-qt5-qtbase Operating systems & Components / Operating system package or component mingw-qt5-qtactiveqt Operating systems & Components / Operating system package or component mingw-qt5-qt3d Operating systems & Components / Operating system package or component mingw-python-qt5 Operating systems & Components / Operating system package or component |
Vendor | Fedoraproject |
Security Bulletin
This security bulletin contains information about 5 vulnerabilities.
EUVDB-ID: #VU17337
Risk: Low
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2018-15518
CWE-ID:
CWE-611 - Improper Restriction of XML External Entity Reference ('XXE')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to conduct XXE-attack.
The vulnerability exists due to improper handling of XML External Entities (XXEs) when parsing an XML file. A remote attacker can trick the victim into opening an XML file that submits malicious input, trigger a double-free error in QXmlStream and cause the service to crash.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsFedora: 29
mingw-sip: before 4.19.13-2.fc29
mingw-qt5-qtxmlpatterns: before 5.11.3-1.fc29
mingw-qt5-qtwinextras: before 5.11.3-1.fc29
mingw-qt5-qtwebsockets: before 5.11.3-1.fc29
mingw-qt5-qtwebkit: before 5.9.4-0.8.gitbd0657f.fc29
mingw-qt5-qttranslations: before 5.11.3-1.fc29
mingw-qt5-qttools: before 5.11.3-1.fc29
mingw-qt5-qtsvg: before 5.11.3-1.fc29
mingw-qt5-qtserialport: before 5.11.3-1.fc29
mingw-qt5-qtsensors: before 5.11.3-1.fc29
mingw-qt5-qtscript: before 5.11.3-1.fc29
mingw-qt5-qtquickcontrols: before 5.11.3-1.fc29
mingw-qt5-qtmultimedia: before 5.11.3-1.fc29
mingw-qt5-qtlocation: before 5.11.3-1.fc29
mingw-qt5-qtimageformats: before 5.11.3-1.fc29
mingw-qt5-qtgraphicaleffects: before 5.11.3-1.fc29
mingw-qt5-qtdeclarative: before 5.11.3-1.fc29
mingw-qt5-qtcharts: before 5.11.3-1.fc29
mingw-qt5-qtbase: before 5.11.3-1.fc29
mingw-qt5-qtactiveqt: before 5.11.3-1.fc29
mingw-qt5-qt3d: before 5.11.3-1.fc29
mingw-python-qt5: before 5.11.3-2.fc29
CPE2.3https://bodhi.fedoraproject.org/updates/FEDORA-2019-3c45bd2cc3
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU17338
Risk: Low
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2018-19870
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error in QGifHandler. A remote attacker can trick the victim into opening a specially crafted GIF image, trigger a segmentation fault and cause the service to crash.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsFedora: 29
mingw-sip: before 4.19.13-2.fc29
mingw-qt5-qtxmlpatterns: before 5.11.3-1.fc29
mingw-qt5-qtwinextras: before 5.11.3-1.fc29
mingw-qt5-qtwebsockets: before 5.11.3-1.fc29
mingw-qt5-qtwebkit: before 5.9.4-0.8.gitbd0657f.fc29
mingw-qt5-qttranslations: before 5.11.3-1.fc29
mingw-qt5-qttools: before 5.11.3-1.fc29
mingw-qt5-qtsvg: before 5.11.3-1.fc29
mingw-qt5-qtserialport: before 5.11.3-1.fc29
mingw-qt5-qtsensors: before 5.11.3-1.fc29
mingw-qt5-qtscript: before 5.11.3-1.fc29
mingw-qt5-qtquickcontrols: before 5.11.3-1.fc29
mingw-qt5-qtmultimedia: before 5.11.3-1.fc29
mingw-qt5-qtlocation: before 5.11.3-1.fc29
mingw-qt5-qtimageformats: before 5.11.3-1.fc29
mingw-qt5-qtgraphicaleffects: before 5.11.3-1.fc29
mingw-qt5-qtdeclarative: before 5.11.3-1.fc29
mingw-qt5-qtcharts: before 5.11.3-1.fc29
mingw-qt5-qtbase: before 5.11.3-1.fc29
mingw-qt5-qtactiveqt: before 5.11.3-1.fc29
mingw-qt5-qt3d: before 5.11.3-1.fc29
mingw-python-qt5: before 5.11.3-2.fc29
CPE2.3https://bodhi.fedoraproject.org/updates/FEDORA-2019-3c45bd2cc3
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU17339
Risk: Low
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2018-19873
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to buffer overflow in QBmpHandler. A remote attacker can trick the victim into opening specially crafted BMP data, trigger memory corruption and cause the service to crash.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsFedora: 29
mingw-sip: before 4.19.13-2.fc29
mingw-qt5-qtxmlpatterns: before 5.11.3-1.fc29
mingw-qt5-qtwinextras: before 5.11.3-1.fc29
mingw-qt5-qtwebsockets: before 5.11.3-1.fc29
mingw-qt5-qtwebkit: before 5.9.4-0.8.gitbd0657f.fc29
mingw-qt5-qttranslations: before 5.11.3-1.fc29
mingw-qt5-qttools: before 5.11.3-1.fc29
mingw-qt5-qtsvg: before 5.11.3-1.fc29
mingw-qt5-qtserialport: before 5.11.3-1.fc29
mingw-qt5-qtsensors: before 5.11.3-1.fc29
mingw-qt5-qtscript: before 5.11.3-1.fc29
mingw-qt5-qtquickcontrols: before 5.11.3-1.fc29
mingw-qt5-qtmultimedia: before 5.11.3-1.fc29
mingw-qt5-qtlocation: before 5.11.3-1.fc29
mingw-qt5-qtimageformats: before 5.11.3-1.fc29
mingw-qt5-qtgraphicaleffects: before 5.11.3-1.fc29
mingw-qt5-qtdeclarative: before 5.11.3-1.fc29
mingw-qt5-qtcharts: before 5.11.3-1.fc29
mingw-qt5-qtbase: before 5.11.3-1.fc29
mingw-qt5-qtactiveqt: before 5.11.3-1.fc29
mingw-qt5-qt3d: before 5.11.3-1.fc29
mingw-python-qt5: before 5.11.3-2.fc29
CPE2.3https://bodhi.fedoraproject.org/updates/FEDORA-2019-3c45bd2cc3
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU27496
Risk: Medium
CVSSv4.0: 4.8 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2018-19869
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing SVG images within the qsvghandler.cpp file in Qt. A remote attacker can create a specially crafted image, pass it to he application that uses Qt library for SVG processing, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsFedora: 29
mingw-sip: before 4.19.13-2.fc29
mingw-qt5-qtxmlpatterns: before 5.11.3-1.fc29
mingw-qt5-qtwinextras: before 5.11.3-1.fc29
mingw-qt5-qtwebsockets: before 5.11.3-1.fc29
mingw-qt5-qtwebkit: before 5.9.4-0.8.gitbd0657f.fc29
mingw-qt5-qttranslations: before 5.11.3-1.fc29
mingw-qt5-qttools: before 5.11.3-1.fc29
mingw-qt5-qtsvg: before 5.11.3-1.fc29
mingw-qt5-qtserialport: before 5.11.3-1.fc29
mingw-qt5-qtsensors: before 5.11.3-1.fc29
mingw-qt5-qtscript: before 5.11.3-1.fc29
mingw-qt5-qtquickcontrols: before 5.11.3-1.fc29
mingw-qt5-qtmultimedia: before 5.11.3-1.fc29
mingw-qt5-qtlocation: before 5.11.3-1.fc29
mingw-qt5-qtimageformats: before 5.11.3-1.fc29
mingw-qt5-qtgraphicaleffects: before 5.11.3-1.fc29
mingw-qt5-qtdeclarative: before 5.11.3-1.fc29
mingw-qt5-qtcharts: before 5.11.3-1.fc29
mingw-qt5-qtbase: before 5.11.3-1.fc29
mingw-qt5-qtactiveqt: before 5.11.3-1.fc29
mingw-qt5-qt3d: before 5.11.3-1.fc29
mingw-python-qt5: before 5.11.3-2.fc29
CPE2.3https://bodhi.fedoraproject.org/updates/FEDORA-2019-3c45bd2cc3
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU27497
Risk: Medium
CVSSv4.0: 4.6 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2018-19871
CWE-ID:
CWE-400 - Resource exhaustion
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to application does not properly control consumption of internal resources within QTgaFile in Qt. A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsFedora: 29
mingw-sip: before 4.19.13-2.fc29
mingw-qt5-qtxmlpatterns: before 5.11.3-1.fc29
mingw-qt5-qtwinextras: before 5.11.3-1.fc29
mingw-qt5-qtwebsockets: before 5.11.3-1.fc29
mingw-qt5-qtwebkit: before 5.9.4-0.8.gitbd0657f.fc29
mingw-qt5-qttranslations: before 5.11.3-1.fc29
mingw-qt5-qttools: before 5.11.3-1.fc29
mingw-qt5-qtsvg: before 5.11.3-1.fc29
mingw-qt5-qtserialport: before 5.11.3-1.fc29
mingw-qt5-qtsensors: before 5.11.3-1.fc29
mingw-qt5-qtscript: before 5.11.3-1.fc29
mingw-qt5-qtquickcontrols: before 5.11.3-1.fc29
mingw-qt5-qtmultimedia: before 5.11.3-1.fc29
mingw-qt5-qtlocation: before 5.11.3-1.fc29
mingw-qt5-qtimageformats: before 5.11.3-1.fc29
mingw-qt5-qtgraphicaleffects: before 5.11.3-1.fc29
mingw-qt5-qtdeclarative: before 5.11.3-1.fc29
mingw-qt5-qtcharts: before 5.11.3-1.fc29
mingw-qt5-qtbase: before 5.11.3-1.fc29
mingw-qt5-qtactiveqt: before 5.11.3-1.fc29
mingw-qt5-qt3d: before 5.11.3-1.fc29
mingw-python-qt5: before 5.11.3-2.fc29
CPE2.3https://bodhi.fedoraproject.org/updates/FEDORA-2019-3c45bd2cc3
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.