Vulnerabilities > CVE-2006-1249 - Numeric Errors vulnerability in Apple Itunes and Quicktime
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Integer overflow in Apple QuickTime Player 7.0.3 and 7.0.4 and iTunes 6.0.1 and 6.0.2 allows remote attackers to execute arbitrary code via a FlashPix (FPX) image that contains a field that specifies a large number of blocks.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 4 |
Common Weakness Enumeration (CWE)
Nessus
NASL family Windows NASL id QUICKTIME_71.NASL description The remote Windows host is running a version of QuickTime prior to 7.1. The remote version of QuickTime is vulnerable to various integer and buffer overflows involving specially crafted image and media files. An attacker may be able to leverage these issues to execute arbitrary code on the remote host by sending a malformed file to a victim and having him open it using QuickTime player. last seen 2020-06-01 modified 2020-06-02 plugin id 21556 published 2006-05-15 reporter This script is Copyright (C) 2006-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/21556 title QuickTime < 7.1 Multiple Vulnerabilities (Windows) code # # (C) Tenable Network Security, Inc. # if (NASL_LEVEL < 3000) exit(0); include("compat.inc"); if (description) { script_id(21556); script_version("1.22"); script_cve_id("CVE-2006-1249", "CVE-2006-1453", "CVE-2006-1454", "CVE-2006-1458", "CVE-2006-1459", "CVE-2006-1460", "CVE-2006-1461", "CVE-2006-1462", "CVE-2006-1463", "CVE-2006-1464", "CVE-2006-1465", "CVE-2006-2238"); script_bugtraq_id(17074, 17953); script_name(english:"QuickTime < 7.1 Multiple Vulnerabilities (Windows)"); script_summary(english:"Checks version of QuickTime on Windows"); script_set_attribute(attribute:"synopsis", value: "The remote version of QuickTime is affected by multiple overflow vulnerabilities." ); script_set_attribute(attribute:"description", value: "The remote Windows host is running a version of QuickTime prior to 7.1. The remote version of QuickTime is vulnerable to various integer and buffer overflows involving specially crafted image and media files. An attacker may be able to leverage these issues to execute arbitrary code on the remote host by sending a malformed file to a victim and having him open it using QuickTime player." ); script_set_attribute(attribute:"see_also", value:"https://lists.apple.com/archives/security-announce/2006/May/msg00002.html" ); script_set_attribute(attribute:"solution", value: "Upgrade to QuickTime version 7.1 or later." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_cwe_id(189); script_set_attribute(attribute:"plugin_publication_date", value: "2006/05/15"); script_set_attribute(attribute:"vuln_publication_date", value: "2006/05/09"); script_cvs_date("Date: 2018/11/15 20:50:28"); script_set_attribute(attribute:"patch_publication_date", value: "2006/05/09"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/a:apple:quicktime"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_family(english:"Windows"); script_copyright(english:"This script is Copyright (C) 2006-2018 Tenable Network Security, Inc."); script_dependencies("quicktime_installed.nasl"); script_require_keys("SMB/QuickTime/Version"); exit(0); } # ver = get_kb_item("SMB/QuickTime/Version"); if (ver && ver =~ "^([0-6]\.|7\.0\.)") security_hole(get_kb_item("SMB/transport"));
NASL family MacOS X Local Security Checks NASL id MACOSX_QUICKTIME71.NASL description The remote Mac OS X host is running a version of Quicktime prior to 7.1. The remote version of Quicktime is vulnerable to various integer and buffer overflows involving specially crafted image and media files. An attacker may be able to leverage these issues to execute arbitrary code on the remote host by sending a malformed file to a victim and having him open it using QuickTime player. last seen 2020-06-01 modified 2020-06-02 plugin id 21554 published 2006-05-13 reporter This script is Copyright (C) 2005-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/21554 title Quicktime < 7.1 Multiple Vulnerabilities (Mac OS X)
References
- http://www.eeye.com/html/research/upcoming/20060307b.html
- http://www.securityfocus.com/bid/17074
- http://lists.apple.com/archives/security-announce/2006/May/msg00002.html
- http://securitytracker.com/id?1016067
- http://secunia.com/advisories/20069
- http://www.kb.cert.org/vuls/id/570689
- http://www.us-cert.gov/cas/techalerts/TA06-132B.html
- http://www.vupen.com/english/advisories/2006/1778
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26398
- http://www.securityfocus.com/archive/1/433850/100/0/threaded
- http://www.securityfocus.com/archive/1/433831/100/0/threaded