Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2023-24607

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-15 Apr, 2023 | 00:00
Updated At-02 Aug, 2024 | 11:03
Rejected At-
Credits

Qt before 6.4.3 allows a denial of service via a crafted string when the SQL ODBC driver plugin is used and the size of SQLTCHAR is 4. The affected versions are 5.x before 5.15.13, 6.x before 6.2.8, and 6.3.x before 6.4.3.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:15 Apr, 2023 | 00:00
Updated At:02 Aug, 2024 | 11:03
Rejected At:
▼CVE Numbering Authority (CNA)

Qt before 6.4.3 allows a denial of service via a crafted string when the SQL ODBC driver plugin is used and the size of SQLTCHAR is 4. The affected versions are 5.x before 5.15.13, 6.x before 6.2.8, and 6.3.x before 6.4.3.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.qt.io/blog/tag/security
N/A
https://codereview.qt-project.org/c/qt/qtbase/+/456216
N/A
https://codereview.qt-project.org/c/qt/tqtc-qtbase/+/456217
N/A
https://codereview.qt-project.org/c/qt/tqtc-qtbase/+/456238
N/A
https://download.qt.io/official_releases/qt/5.15/CVE-2023-24607-qtbase-5.15.diff
N/A
https://github.com/qt/qtbase/commit/aaf1381eab6292aa0444a5eadcc24165b6e1c02d
N/A
https://www.qt.io/blog/security-advisory-qt-sql-odbc-driver-plugin
N/A
https://lists.debian.org/debian-lts-announce/2024/04/msg00027.html
mailing-list
Hyperlink: https://www.qt.io/blog/tag/security
Resource: N/A
Hyperlink: https://codereview.qt-project.org/c/qt/qtbase/+/456216
Resource: N/A
Hyperlink: https://codereview.qt-project.org/c/qt/tqtc-qtbase/+/456217
Resource: N/A
Hyperlink: https://codereview.qt-project.org/c/qt/tqtc-qtbase/+/456238
Resource: N/A
Hyperlink: https://download.qt.io/official_releases/qt/5.15/CVE-2023-24607-qtbase-5.15.diff
Resource: N/A
Hyperlink: https://github.com/qt/qtbase/commit/aaf1381eab6292aa0444a5eadcc24165b6e1c02d
Resource: N/A
Hyperlink: https://www.qt.io/blog/security-advisory-qt-sql-odbc-driver-plugin
Resource: N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2024/04/msg00027.html
Resource:
mailing-list
▼Authorized Data Publishers (ADP)
1. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
2. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.qt.io/blog/tag/security
x_transferred
https://codereview.qt-project.org/c/qt/qtbase/+/456216
x_transferred
https://codereview.qt-project.org/c/qt/tqtc-qtbase/+/456217
x_transferred
https://codereview.qt-project.org/c/qt/tqtc-qtbase/+/456238
x_transferred
https://download.qt.io/official_releases/qt/5.15/CVE-2023-24607-qtbase-5.15.diff
x_transferred
https://github.com/qt/qtbase/commit/aaf1381eab6292aa0444a5eadcc24165b6e1c02d
x_transferred
https://www.qt.io/blog/security-advisory-qt-sql-odbc-driver-plugin
x_transferred
https://lists.debian.org/debian-lts-announce/2024/04/msg00027.html
mailing-list
x_transferred
Hyperlink: https://www.qt.io/blog/tag/security
Resource:
x_transferred
Hyperlink: https://codereview.qt-project.org/c/qt/qtbase/+/456216
Resource:
x_transferred
Hyperlink: https://codereview.qt-project.org/c/qt/tqtc-qtbase/+/456217
Resource:
x_transferred
Hyperlink: https://codereview.qt-project.org/c/qt/tqtc-qtbase/+/456238
Resource:
x_transferred
Hyperlink: https://download.qt.io/official_releases/qt/5.15/CVE-2023-24607-qtbase-5.15.diff
Resource:
x_transferred
Hyperlink: https://github.com/qt/qtbase/commit/aaf1381eab6292aa0444a5eadcc24165b6e1c02d
Resource:
x_transferred
Hyperlink: https://www.qt.io/blog/security-advisory-qt-sql-odbc-driver-plugin
Resource:
x_transferred
Hyperlink: https://lists.debian.org/debian-lts-announce/2024/04/msg00027.html
Resource:
mailing-list
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:15 Apr, 2023 | 01:15
Updated At:01 May, 2024 | 01:15

Qt before 6.4.3 allows a denial of service via a crafted string when the SQL ODBC driver plugin is used and the size of SQLTCHAR is 4. The affected versions are 5.x before 5.15.13, 6.x before 6.2.8, and 6.3.x before 6.4.3.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Type: Primary
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CPE Matches

qt
qt
>>qt>>Versions from 5.0.0(inclusive) to 5.15.13(exclusive)
cpe:2.3:a:qt:qt:*:*:*:*:*:*:*:*
qt
qt
>>qt>>Versions from 6.0.0(inclusive) to 6.2.8(exclusive)
cpe:2.3:a:qt:qt:*:*:*:*:*:*:*:*
qt
qt
>>qt>>Versions from 6.3.0(inclusive) to 6.4.3(exclusive)
cpe:2.3:a:qt:qt:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
NVD-CWE-noinfoPrimarynvd@nist.gov
CWE ID: NVD-CWE-noinfo
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://codereview.qt-project.org/c/qt/qtbase/+/456216cve@mitre.org
Issue Tracking
https://codereview.qt-project.org/c/qt/tqtc-qtbase/+/456217cve@mitre.org
Permissions Required
https://codereview.qt-project.org/c/qt/tqtc-qtbase/+/456238cve@mitre.org
Permissions Required
https://download.qt.io/official_releases/qt/5.15/CVE-2023-24607-qtbase-5.15.diffcve@mitre.org
Vendor Advisory
https://github.com/qt/qtbase/commit/aaf1381eab6292aa0444a5eadcc24165b6e1c02dcve@mitre.org
Patch
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2024/04/msg00027.htmlcve@mitre.org
N/A
https://www.qt.io/blog/security-advisory-qt-sql-odbc-driver-plugincve@mitre.org
Product
https://www.qt.io/blog/tag/securitycve@mitre.org
Release Notes
Hyperlink: https://codereview.qt-project.org/c/qt/qtbase/+/456216
Source: cve@mitre.org
Resource:
Issue Tracking
Hyperlink: https://codereview.qt-project.org/c/qt/tqtc-qtbase/+/456217
Source: cve@mitre.org
Resource:
Permissions Required
Hyperlink: https://codereview.qt-project.org/c/qt/tqtc-qtbase/+/456238
Source: cve@mitre.org
Resource:
Permissions Required
Hyperlink: https://download.qt.io/official_releases/qt/5.15/CVE-2023-24607-qtbase-5.15.diff
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: https://github.com/qt/qtbase/commit/aaf1381eab6292aa0444a5eadcc24165b6e1c02d
Source: cve@mitre.org
Resource:
Patch
Third Party Advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2024/04/msg00027.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://www.qt.io/blog/security-advisory-qt-sql-odbc-driver-plugin
Source: cve@mitre.org
Resource:
Product
Hyperlink: https://www.qt.io/blog/tag/security
Source: cve@mitre.org
Resource:
Release Notes

Change History

0
Information is not available yet

Similar CVEs

7Records found

CVE-2023-32763
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.09% / 25.72%
||
7 Day CHG~0.00%
Published-28 May, 2023 | 00:00
Updated-02 Aug, 2024 | 15:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Qt before 5.15.15, 6.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.1. When a SVG file with an image inside it is rendered, a QTextLayout buffer overflow can be triggered.

Action-Not Available
Vendor-qtn/a
Product-qtn/a
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2023-38197
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.05% / 13.27%
||
7 Day CHG-0.01%
Published-13 Jul, 2023 | 00:00
Updated-02 Aug, 2024 | 17:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Qt before 5.15.15, 6.x before 6.2.10, and 6.3.x through 6.5.x before 6.5.3. There are infinite loops in recursive entity expansion.

Action-Not Available
Vendor-qtn/aqtFedora Project
Product-qtn/aqtfedora
CWE ID-CWE-835
Loop with Unreachable Exit Condition ('Infinite Loop')
CVE-2015-9541
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.71% / 71.41%
||
7 Day CHG~0.00%
Published-24 Jan, 2020 | 21:53
Updated-06 Aug, 2024 | 08:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Qt through 5.14 allows an exponential XML entity expansion attack via a crafted SVG document that is mishandled in QXmlStreamReader, a related issue to CVE-2003-1564.

Action-Not Available
Vendor-qtn/aFedora Project
Product-qtfedoran/a
CWE ID-CWE-776
Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')
CVE-2018-21035
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-8.6||HIGH
EPSS-0.43% / 62.06%
||
7 Day CHG~0.00%
Published-28 Feb, 2020 | 19:17
Updated-05 Aug, 2024 | 12:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Qt through 5.14.1, the WebSocket implementation accepts up to 2GB for frames and 2GB for messages. Smaller limits cannot be configured. This makes it easier for attackers to cause a denial of service (memory consumption).

Action-Not Available
Vendor-qtn/a
Product-qtn/a
CWE ID-CWE-770
Allocation of Resources Without Limits or Throttling
CVE-2020-13962
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-1.11% / 77.24%
||
7 Day CHG~0.00%
Published-08 Jun, 2020 | 23:14
Updated-04 Aug, 2024 | 12:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Qt 5.12.2 through 5.14.2, as used in unofficial builds of Mumble 1.3.0 and other products, mishandles OpenSSL's error queue, which can cause a denial of service to QSslSocket users. Because errors leak in unrelated TLS sessions, an unrelated session may be disconnected when any handshake fails. (Mumble 1.3.1 is not affected, regardless of the Qt version.)

Action-Not Available
Vendor-qtmumblen/aopenSUSEFedora Project
Product-mumblefedoraqtleapn/a
CVE-2023-37369
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.22% / 45.02%
||
7 Day CHG-0.06%
Published-20 Aug, 2023 | 00:00
Updated-02 Aug, 2024 | 17:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Qt before 5.15.15, 6.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.2, there can be an application crash in QXmlStreamReader via a crafted XML string that triggers a situation in which a prefix is greater than a length.

Action-Not Available
Vendor-qtn/aDebian GNU/Linux
Product-qtdebian_linuxn/a
CVE-2021-38593
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.94% / 75.22%
||
7 Day CHG~0.00%
Published-12 Aug, 2021 | 00:00
Updated-04 Aug, 2024 | 01:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Qt 5.x before 5.15.6 and 6.x through 6.1.2 has an out-of-bounds write in QOutlineMapper::convertPath (called from QRasterPaintEngine::fill and QPaintEngineEx::stroke).

Action-Not Available
Vendor-qtn/aFedora Project
Product-qtfedoran/a
CWE ID-CWE-787
Out-of-bounds Write
Details not found