CVE-2006-4811

N/A Unknown
Published: October 18, 2006 Modified: April 23, 2026
View on NVD

Description

Integer overflow in Qt 3.3 before 3.3.7, 4.1 before 4.1.5, and 4.2 before 4.2.1, as used in the KDE khtml library, kdelibs 3.1.3, and possibly other packages, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted pixmap image.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/22380
Source: secalert@redhat.com
Patch Vendor Advisory
http://secunia.com/advisories/22397
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22479
Source: secalert@redhat.com
Patch Vendor Advisory
http://secunia.com/advisories/22485
Source: secalert@redhat.com
Patch Vendor Advisory
http://secunia.com/advisories/22492
Source: secalert@redhat.com
Patch Vendor Advisory
http://secunia.com/advisories/22520
Source: secalert@redhat.com
Patch Vendor Advisory
http://secunia.com/advisories/22579
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22586
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22589
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22645
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22738
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22890
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/22929
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/24347
Source: secalert@redhat.com
Vendor Advisory
http://securitytracker.com/id?1017084
Source: secalert@redhat.com
http://www.redhat.com/support/errata/RHSA-2006-0720.html
Source: secalert@redhat.com
Patch Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2006-0725.html
Source: secalert@redhat.com
Vendor Advisory
http://www.securityfocus.com/bid/20599
Source: secalert@redhat.com
http://www.ubuntu.com/usn/usn-368-1
Source: secalert@redhat.com
Patch
http://www.vupen.com/english/advisories/2006/4099
Source: secalert@redhat.com
Vendor Advisory
https://issues.rpath.com/browse/RPL-723
Source: secalert@redhat.com
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=210742
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/22380
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://secunia.com/advisories/22397
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/22479
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://secunia.com/advisories/22485
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://secunia.com/advisories/22492
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://secunia.com/advisories/22520
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://secunia.com/advisories/22579
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/22586
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/22589
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/22645
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/22738
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/22890
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/22929
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/24347
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://security.gentoo.org/glsa/glsa-200611-02.xml
Source: af854a3a-2127-422b-91ae-364da2661108
http://security.gentoo.org/glsa/glsa-200703-06.xml
Source: af854a3a-2127-422b-91ae-364da2661108
http://securitytracker.com/id?1017084
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDKSA-2006:186
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDKSA-2006:187
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2006-0720.html
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2006-0725.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.securityfocus.com/archive/1/449173/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/20599
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ubuntu.com/usn/usn-368-1
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.us.debian.org/security/2006/dsa-1200
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2006/4099
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://issues.rpath.com/browse/RPL-723
Source: af854a3a-2127-422b-91ae-364da2661108

68 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

qt redhat