7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.968 High
EPSS
Percentile
99.7%
Apple QuickTime contains a heap-based buffer overflow that may allow an attacker to execute arbitrary code or cause a denial-of-service condition.
Apple QuickTime fails to properly validate QuickTime Images (QTIF), potentially allowing a heap-based buffer overflow to occur. If a remote attacker supplies a vulnerable Apple QuickTime installation with a specially crafted QTIF image, that attacker may be able to trigger the buffer overflow. In addition, this issue may also be exploitable via specially crafted PICT and JPEG images.
Note that this issue affects QuickTime installations on both Apple Mac and Microsoft Windows operating systems.
A remote unauthenticated attacker may be able to execute arbitrary code or cause a denial-of-service condition, if they can persuade a user to access a specially crafted QTIF image.
Apply Update
Apple has corrected this issue in Apple Security Update for QuickTime 7.0.4. This update is also included in the Mac OS X 10.4.4 Update (Delta).
Do not access Image files from untrusted sources
Exploitation occurs by accessing a specially crafted image file with QuickTime. By only accessing image files from trusted or known sources, the chances of exploitation are reduced.
629845
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Notified: January 11, 2006 Updated: January 11, 2006
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Please see <http://docs.info.apple.com/article.html?artnum=303101> and <http://docs.info.apple.com/article.html?artnum=302810>.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23629845 Feedback>).
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
This issue was reported by Dennis Rand of DK-CERT. Apple credits Varun Uppal of Kanbay.
This document was written by Jeff Gennari
CVE IDs: | CVE-2005-2340 |
---|---|
Severity Metric: | 18.23 Date Public: |