Two vulnerabilities have been reported in Qt, which can be exploited by malicious people to compromise an application using the library.
1) An error due to the "QLibrary::resolve()" method in QtCore4.dll loading libraries (e.g. wintab32.dll and dwmapi.dll in QtGui4.dll) in an insecure manner can be exploited to load arbitrary libraries when an application using this library e.g. opens a file located on a remote WebDAV or SMB share.
Successful exploitation of this vulnerability allows execution of arbitrary code.
This vulnerability is confirmed in version 4.6.3. Other versions may also be affected.
2) An error in the harfbuzz module (src/3rdparty/harfbuzz/src/harfbuzz-gpos.c) when processing certain fonts can be exploited to cause a buffer overflow.
Successful exploitation of this vulnerability may allow execution of arbitrary code.
Solution: Update to version 4.7.4.
Provided and/or discovered by: 1) Reported by various people in a number of applications bundling vulnerable versions of Qt.
2) Disclosed in a Git commit.
Original Advisory: Git commit:
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to firstname.lastname@example.org
Subject: Qt Insecure Library Loading and Buffer Overflow Vulnerabilities