Apple QuickTime fails to properly handle FlashPix images. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary code or cause a denial of service condition.
Apple's QuickTime Player is multimedia software that allows users to view local and remote audio, video, and image content. QuickTime contains an integer overflow in the code that handles FlashPix images. This vulnerability may be triggered by sending the QuickTime Player, or an application that uses the QuickTime plug-in, a specially crafted FlashPix file.
Note that this issue affects QuickTime installations on both Apple Mac and Windows operating systems.
A remote, unauthenticated attacker may be able to execute arbitrary code or cause a denial of service condition.
Apple has addressed this issue with QuickTime 7.1, as specified in Apple Support Document 303752.
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Updated: May 15, 2006
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Refer to <http://docs.info.apple.com/article.html?artnum=303752>.
If you have feedback, comments, or additional information about this vulnerability, please send us email.
Group | Score | Vector
Base | |
Temporal | |
Environmental | |
This issue was reported in the Apple Support Document 303752.
This document was written by Jeff Gennari.
CVE IDs: | CVE-2006-1249
Severity Metric: | 17.50
Date Public: | 2006-05-11
Date First Published: | 2006-05-15
Date Last Updated: | 2006-05-17 21:31 UTC
Document Revision: | 14