Vulnerabilities > CVE-2006-1249 - Numeric Errors vulnerability in Apple Itunes and Quicktime

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN

Summary

Integer overflow in Apple QuickTime Player 7.0.3 and 7.0.4 and iTunes 6.0.1 and 6.0.2 allows remote attackers to execute arbitrary code via a FlashPix (FPX) image that contains a field that specifies a large number of blocks.

Vulnerable Configurations

Part Description Count
Application
Apple
4

Common Weakness Enumeration (CWE)

Nessus

  • NASL familyWindows
    NASL idQUICKTIME_71.NASL
    descriptionThe remote Windows host is running a version of QuickTime prior to 7.1. The remote version of QuickTime is vulnerable to various integer and buffer overflows involving specially crafted image and media files. An attacker may be able to leverage these issues to execute arbitrary code on the remote host by sending a malformed file to a victim and having him open it using QuickTime player.
    last seen2020-06-01
    modified2020-06-02
    plugin id21556
    published2006-05-15
    reporterThis script is Copyright (C) 2006-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/21556
    titleQuickTime < 7.1 Multiple Vulnerabilities (Windows)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    if (NASL_LEVEL < 3000) exit(0);
    
    
    
    include("compat.inc");
    
    if (description)
    {
      script_id(21556);
      script_version("1.22");
    
      script_cve_id("CVE-2006-1249", "CVE-2006-1453", "CVE-2006-1454", "CVE-2006-1458", "CVE-2006-1459", 
                    "CVE-2006-1460", "CVE-2006-1461", "CVE-2006-1462", "CVE-2006-1463", "CVE-2006-1464", 
                    "CVE-2006-1465", "CVE-2006-2238");
      script_bugtraq_id(17074, 17953);
    
      script_name(english:"QuickTime < 7.1 Multiple Vulnerabilities (Windows)");
      script_summary(english:"Checks version of QuickTime on Windows");
     
     script_set_attribute(attribute:"synopsis", value:
    "The remote version of QuickTime is affected by multiple overflow
    vulnerabilities." );
     script_set_attribute(attribute:"description", value:
    "The remote Windows host is running a version of QuickTime prior to
    7.1. 
    
    The remote version of QuickTime is vulnerable to various integer and
    buffer overflows involving specially crafted image and media files. 
    An attacker may be able to leverage these issues to execute arbitrary
    code on the remote host by sending a malformed file to a victim and
    having him open it using QuickTime player." );
     script_set_attribute(attribute:"see_also", value:"https://lists.apple.com/archives/security-announce/2006/May/msg00002.html" );
     script_set_attribute(attribute:"solution", value:
    "Upgrade to QuickTime version 7.1 or later." );
     script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
     script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
     script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
     script_set_attribute(attribute:"exploit_available", value:"false");
     script_cwe_id(189);
    
     script_set_attribute(attribute:"plugin_publication_date", value: "2006/05/15");
     script_set_attribute(attribute:"vuln_publication_date", value: "2006/05/09");
     script_cvs_date("Date: 2018/11/15 20:50:28");
     script_set_attribute(attribute:"patch_publication_date", value: "2006/05/09");
    script_set_attribute(attribute:"plugin_type", value:"local");
    script_set_attribute(attribute:"cpe", value:"cpe:/a:apple:quicktime");
    script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Windows");
      script_copyright(english:"This script is Copyright (C) 2006-2018 Tenable Network Security, Inc.");
      script_dependencies("quicktime_installed.nasl");
      script_require_keys("SMB/QuickTime/Version");
      exit(0);
    }
    
    #
    
    ver = get_kb_item("SMB/QuickTime/Version");
    if (ver && ver =~ "^([0-6]\.|7\.0\.)") security_hole(get_kb_item("SMB/transport"));
    
  • NASL familyMacOS X Local Security Checks
    NASL idMACOSX_QUICKTIME71.NASL
    descriptionThe remote Mac OS X host is running a version of Quicktime prior to 7.1. The remote version of Quicktime is vulnerable to various integer and buffer overflows involving specially crafted image and media files. An attacker may be able to leverage these issues to execute arbitrary code on the remote host by sending a malformed file to a victim and having him open it using QuickTime player.
    last seen2020-06-01
    modified2020-06-02
    plugin id21554
    published2006-05-13
    reporterThis script is Copyright (C) 2005-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/21554
    titleQuicktime < 7.1 Multiple Vulnerabilities (Mac OS X)