Apple QuickTime fails to properly handle JPEG images. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary code or cause a denial of service condition.
Apple's QuickTime Player is multimedia software that allows users to view local and remote audio, video, and image content. QuickTime contains an integer overflow in code that handles JPEG images. This vulnerability may be triggered by sending the QuickTime Player, or an application that uses the QuickTime plug-in, a specially crafted JPEG image file.
Note that this issue affects QuickTime installations on both Apple Mac and Windows operating systems.
A remote, unauthenticated attacker may be able to execute arbitrary code or cause a denial of service condition.
Apple has addressed this issue with QuickTime 7.1, as specified in Apple Support Document 303752.
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Notified: May 12, 2006 Updated: May 12, 2006
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Refer to <http://docs.info.apple.com/article.html?artnum=303752>.
If you have feedback, comments, or additional information about this vulnerability, please send us email.
Group | Score | Vector
Base | |
Temporal | |
Environmental | |
This issue was reported in the Apple Support Document 303752.
This document was written by Jeff Gennari.
CVE IDs: | CVE-2006-1458
Severity Metric: | 17.71
Date Public: | 2006-05-11
Date First Published: | 2006-05-12
Date Last Updated: | 2006-05-17 21:25 UTC
Document Revision: | 33