Vulnerabilities > CVE-2006-1464 - Integer and Buffer Overflow vulnerability in Apple Quicktime 7.0.3/7.0.4
Attack vector
NETWORK Attack complexity
HIGH Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
Buffer overflow in Apple QuickTime before 7.1 allows remote attackers to execute arbitrary code via a crafted QuickTime MPEG4 (M4P) video format file.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 2 |
Nessus
NASL family Windows NASL id QUICKTIME_71.NASL description The remote Windows host is running a version of QuickTime prior to 7.1. The remote version of QuickTime is vulnerable to various integer and buffer overflows involving specially crafted image and media files. An attacker may be able to leverage these issues to execute arbitrary code on the remote host by sending a malformed file to a victim and having him open it using QuickTime player. last seen 2020-06-01 modified 2020-06-02 plugin id 21556 published 2006-05-15 reporter This script is Copyright (C) 2006-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/21556 title QuickTime < 7.1 Multiple Vulnerabilities (Windows) code # # (C) Tenable Network Security, Inc. # if (NASL_LEVEL < 3000) exit(0); include("compat.inc"); if (description) { script_id(21556); script_version("1.22"); script_cve_id("CVE-2006-1249", "CVE-2006-1453", "CVE-2006-1454", "CVE-2006-1458", "CVE-2006-1459", "CVE-2006-1460", "CVE-2006-1461", "CVE-2006-1462", "CVE-2006-1463", "CVE-2006-1464", "CVE-2006-1465", "CVE-2006-2238"); script_bugtraq_id(17074, 17953); script_name(english:"QuickTime < 7.1 Multiple Vulnerabilities (Windows)"); script_summary(english:"Checks version of QuickTime on Windows"); script_set_attribute(attribute:"synopsis", value: "The remote version of QuickTime is affected by multiple overflow vulnerabilities." ); script_set_attribute(attribute:"description", value: "The remote Windows host is running a version of QuickTime prior to 7.1. The remote version of QuickTime is vulnerable to various integer and buffer overflows involving specially crafted image and media files. An attacker may be able to leverage these issues to execute arbitrary code on the remote host by sending a malformed file to a victim and having him open it using QuickTime player." ); script_set_attribute(attribute:"see_also", value:"https://lists.apple.com/archives/security-announce/2006/May/msg00002.html" ); script_set_attribute(attribute:"solution", value: "Upgrade to QuickTime version 7.1 or later." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_cwe_id(189); script_set_attribute(attribute:"plugin_publication_date", value: "2006/05/15"); script_set_attribute(attribute:"vuln_publication_date", value: "2006/05/09"); script_cvs_date("Date: 2018/11/15 20:50:28"); script_set_attribute(attribute:"patch_publication_date", value: "2006/05/09"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/a:apple:quicktime"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_family(english:"Windows"); script_copyright(english:"This script is Copyright (C) 2006-2018 Tenable Network Security, Inc."); script_dependencies("quicktime_installed.nasl"); script_require_keys("SMB/QuickTime/Version"); exit(0); } # ver = get_kb_item("SMB/QuickTime/Version"); if (ver && ver =~ "^([0-6]\.|7\.0\.)") security_hole(get_kb_item("SMB/transport"));
NASL family MacOS X Local Security Checks NASL id MACOSX_QUICKTIME71.NASL description The remote Mac OS X host is running a version of Quicktime prior to 7.1. The remote version of Quicktime is vulnerable to various integer and buffer overflows involving specially crafted image and media files. An attacker may be able to leverage these issues to execute arbitrary code on the remote host by sending a malformed file to a victim and having him open it using QuickTime player. last seen 2020-06-01 modified 2020-06-02 plugin id 21554 published 2006-05-13 reporter This script is Copyright (C) 2005-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/21554 title Quicktime < 7.1 Multiple Vulnerabilities (Mac OS X)
Saint
bid | 17953 |
description | QuickTime MOV file udta Atom buffer overflow |
id | misc_quicktime |
osvdb | 25509 |
title | quicktime_udta_atom |
type | client |
References
- http://lists.apple.com/archives/security-announce/2006/May/msg00002.html
- http://secunia.com/advisories/20069
- http://securityreason.com/securityalert/887
- http://securitytracker.com/id?1016067
- http://www.kb.cert.org/vuls/id/587937
- http://www.securityfocus.com/archive/1/433831/100/0/threaded
- http://www.securityfocus.com/bid/17953
- http://www.us-cert.gov/cas/techalerts/TA06-132B.html
- http://www.vupen.com/english/advisories/2006/1778
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26397