Apple QuickTime Streaming Server vulnerable to DoS

2004-09-13T00:00:00
ID VU:914870
Type cert
Reporter CERT
Modified 2004-09-15T00:00:00

Description

Overview

There is a vulnerability in the Apple QuickTime Streaming Server that could allow a remote attacker to cause a denial-of-service condition.

Description

Apple's QuickTime Streaming Server provides an integrated distribution mechanism for various forms of digital content. There is a vulnerability in the QuickTime Streaming Server that could allow a remote attacker to cause a denial-of-service condition.

According to the Apple Security Advisory:
A vulnerability in the QuickTime Streaming Server can be exploited by malicious people to cause a DoS (Denial of Service) via a particular sequence of client operations. This vulnerability affects Server versions only.

The Apple Security Advisory does not specify the set of client operations used to trigger this vulnerability.

In order to regain functionality, the server must be restarted.


Impact

A remote attacker could prevent legitimate users from accessing the streamed content.


Solution

Apply Patch
Apple has released a patch to address this vulnerability in the Apple Security Update 2004-09-07.


Systems Affected

Vendor| Status| Date Notified| Date Updated
---|---|---|---
Apple Computer Inc.| | -| 13 Sep 2004
If you are a vendor and your product is affected, let us know.

CVSS Metrics

Group | Score | Vector
---|---|---
Base | N/A | N/A
Temporal | N/A | N/A
Environmental | N/A | N/A

References

  • <http://docs.info.apple.com/article.html?artnum=61798>
  • <http://secunia.com/advisories/12491/>
  • <http://www.securitytracker.com/alerts/2004/Sep/1011176.html>
  • <http://www.securityfocus.com/bid/11138>

Credit

This vulnerability was reported by Apple.

This document was written by Damon Morda based on information provided by Apple.

Other Information

  • CVE IDs: CAN-2004-0825
  • Date Public: 08 Sep 2004
  • Date First Published: 13 Sep 2004
  • Date Last Updated: 15 Sep 2004
  • Severity Metric: 1.73
  • Document Revision: 12