Apple QuickTime fails to properly handle MPEG-4 movie files. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary code or cause a denial of service condition.
Apple's QuickTime Player is multimedia software that allows users to view local and remote audio, video, and image content. QuickTime contains a buffer overflow in the code that handles MPEG-4 movies. This vulnerability may be triggered by sending the QuickTime Player, or an application that uses the QuickTime plug-in, a specially crafted MPEG-4 movie file.
Note that this issue affects QuickTime installations on both Apple Mac and Windows operating systems.
A remote, unauthenticated attacker may be able to execute arbitrary code or cause a denial of service condition.
Apple has addressed this issue with QuickTime 7.1, as specified in Apple Support Document 303752.
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Vendor has issued information
__ Sort by: Status Alphabetical
Affected Unknown __ Unaffected
Updated: May 17, 2006
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
Refer to <http://docs.info.apple.com/article.html?artnum=303752>.
If you have feedback, comments, or additional information about this vulnerability, please send us email.
Group | Score | Vector
Base | N/A | N/A
Temporal | N/A | N/A
Environmental | | N/A
This issue was reported in the Apple Support Document 303752.
This document was written by Jeff Gennari.
CVE IDs:* | CVE-2006-1464
**Severity Metric: | 17.28
*Date Public: | 2006-05-11
Date First Published: | 2006-05-17
Date Last Updated: | 2006-05-17 21:29 UTC
Document Revision: | 16