5.1 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:H/Au:N/C:P/I:P/A:P
0.044 Low
EPSS
Percentile
92.5%
Apple QuickTime fails to properly handle MPEG-4 movie files. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary code or cause a denial of service condition.
Apple’s QuickTime Player is multimedia software that allows users to view local and remote audio, video, and image content. QuickTime contains a buffer overflow in the code that handles MPEG-4 movies. This vulnerability may be triggered by sending the QuickTime Player, or an application that uses the QuickTime plug-in, a specially crafted MPEG-4 movie file.
Note that this issue affects QuickTime installations on both Apple Mac and Windows operating systems.
A remote, unauthenticated attacker may be able to execute arbitrary code or cause a denial of service condition.
Upgrade
Apple has addressed this issue with QuickTime 7.1, as specified in Apple Support Document 303752.
587937
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Updated: May 17, 2006
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Refer to <http://docs.info.apple.com/article.html?artnum=303752>.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23587937 Feedback>).
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
This issue was reported in the Apple Support Document 303752.
This document was written by Jeff Gennari.
CVE IDs: | CVE-2006-1464 |
---|---|
Severity Metric: | 17.28 Date Public: |