CVE-2025-5683

5.5 MEDIUM

📋 TL;DR

This vulnerability allows an attacker to cause a denial-of-service crash by loading a specially crafted ICNS image file in Qt's QImage component. It affects applications using Qt versions 6.3.0 through 6.5.9, 6.6.0 through 6.8.4, and 6.9.0. The vulnerability requires user interaction to load a malicious image file.

💻 Affected Systems

Products:
  • Qt
  • Applications using Qt's image processing capabilities
Versions: Qt 6.3.0 through 6.5.9, 6.6.0 through 6.8.4, and 6.9.0
Operating Systems: All platforms supported by Qt (Windows, Linux, macOS, etc.)
Default Config Vulnerable: ⚠️ Yes
Notes: Any application using QImage to load ICNS files is vulnerable. The vulnerability is in the QtImageFormats module.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Application crash leading to denial-of-service, potentially disrupting critical functionality in Qt-based applications.

🟠

Likely Case

Application instability or crash when processing malicious ICNS files, requiring restart of affected application.

🟢

If Mitigated

Minimal impact with proper input validation and sandboxing; application may log errors but remain functional.

🌐 Internet-Facing: MEDIUM - Applications accepting user-uploaded images from the internet are vulnerable, but exploitation requires specific ICNS file format.
🏢 Internal Only: LOW - Requires user interaction to load malicious files; internal systems with controlled file sources have lower risk.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user to load a malicious ICNS file. The fuzzing report suggests the crash is easily triggerable with crafted input.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Qt 6.5.10, 6.8.5, and 6.9.1

Vendor Advisory: https://codereview.qt-project.org/c/qt/qtimageformats/+/644548

Restart Required: Yes

Instructions:

1. Identify Qt version in use. 2. Upgrade to patched version: 6.5.10, 6.8.5, or 6.9.1. 3. Recompile applications with updated Qt libraries. 4. Restart affected applications.

🔧 Temporary Workarounds

Disable ICNS file processing

all

Configure applications to reject or not process ICNS image files.

Application-specific configuration required

Input validation for image files

all

Implement file type validation and sanitization before processing user-uploaded images.

Implement file signature checking for ICNS files

🧯 If You Can't Patch

  • Implement strict file upload controls to block ICNS files
  • Run Qt applications in sandboxed environments with limited privileges

🔍 How to Verify

Check if Vulnerable:

Check Qt version with: qmake --version or examine linked Qt libraries in application.

Check Version:

qmake --version

Verify Fix Applied:

Verify Qt version is 6.5.10, 6.8.5, or 6.9.1 or higher. Test with known malicious ICNS file to ensure no crash.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes when loading image files
  • Error logs mentioning QImage or ICNS processing failures

Network Indicators:

  • Unusual ICNS file uploads to web applications

SIEM Query:

Application:Qt AND (EventID:1000 OR Error:*ICNS* OR Crash:*QImage*)

🔗 References

📤 Share & Export