Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Tue, 04 Dec 2012 10:10:29 -0700
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: Jan Lieskovsky <jlieskov@...hat.com>,
        "Steven M. Christey" <coley@...us.mitre.org>,
        "Richard J. Moore" <rich@....org>
Subject: Re: CVE Request -- Qt (x < 4.8.4): QML XmlHttpRequest
 insecure redirection

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 12/04/2012 07:58 AM, Jan Lieskovsky wrote:
> Hello Kurt, Steve, vendors,
> 
> Qt upstream has released 4.8.4 version correcting one security 
> issue:
> 
> An information disclosure flaw was found in the way XMLHttpRequest 
> object implementation in Qt, a software toolkit for developing 
> applications, performed management of certain HTTP responses. 
> Previous implementation allowed redirection from HTTP protocol to
> file schemas. Also the redirection handling was performed 
> automatically by QML application and could not be disabled. A
> remote attacker could use this flaw to cause QML application in an
> unauthorized way to read local file content by causing the HTTP
> response for the application to be a redirect to a file: URL (file
> scheme).
> 
> References: [1]
> http://lists.qt-project.org/pipermail/announce/2012-November/000014.html
>
> 
[2] https://bugzilla.redhat.com/show_bug.cgi?id=883415
> 
> Relevant upstream patch: [3]
> https://codereview.qt-project.org/#change,40034
> 
> Could you allocate a CVE id for this?
> 
> Thank you && Regards, Jan. -- Jan iankko Lieskovsky / Red Hat
> Security Response Team

Please use CVE-2012-5624 for this issue.

- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
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=UliW
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ