Vulnerabilities > CVE-2010-0519 - Numeric Errors vulnerability in Apple mac OS X and mac OS X Server

047910
CVSS 6.8 - MEDIUM
Attack vector
NETWORK
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
apple
CWE-189
nessus
exploit available

Summary

Integer overflow in QuickTime in Apple Mac OS X before 10.6.3 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a FlashPix image with a malformed SubImage Header Stream containing a NumberOfTiles field with a large value.

Common Weakness Enumeration (CWE)

Exploit-Db

descriptionMOAUB #2 - Apple QuickTime FlashPix NumberOfTiles Remote Code Execution Vulnerability. CVE-2010-0519. Dos exploit for windows platform
idEDB-ID:14869
last seen2016-02-01
modified2010-09-02
published2010-09-02
reporterAbysssec
sourcehttps://www.exploit-db.com/download/14869/
titleApple QuickTime FlashPix NumberOfTiles - Remote Code Execution Vulnerability

Nessus

  • NASL familyWindows
    NASL idQUICKTIME_766.NASL
    descriptionThe version of QuickTime installed on the remote Windows host is older than 7.6.6. Such versions contain several vulnerabilities : - A heap-based buffer overflow in QuickTime
    last seen2020-06-01
    modified2020-06-02
    plugin id45388
    published2010-03-31
    reporterThis script is Copyright (C) 2010-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/45388
    titleQuickTime < 7.6.6 Multiple Vulnerabilities (Windows)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    
    if (NASL_LEVEL < 3000) exit(0);
    
    
    include("compat.inc");
    
    
    if (description)
    {
      script_id(45388);
      script_version("1.15");
      script_cvs_date("Date: 2018/07/26 13:32:43");
    
      script_cve_id(
        "CVE-2009-2837",
        "CVE-2010-0059",
        "CVE-2010-0060",
        "CVE-2010-0062",
        "CVE-2010-0514",
        "CVE-2010-0515",
        "CVE-2010-0516",
        "CVE-2010-0517",
        "CVE-2010-0518",
        "CVE-2010-0519",
        "CVE-2010-0520",
        "CVE-2010-0526",
        "CVE-2010-0527",
        "CVE-2010-0528",
        "CVE-2010-0529",
        "CVE-2010-0536"
      );
      script_bugtraq_id(
        39136,
        39139,
        39140,
        39141,
        39152,
        39154,
        39155,
        39159,
        39161,
        39163,
        39164,
        39165,
        39166,
        39167
      );
    
      script_name(english:"QuickTime < 7.6.6 Multiple Vulnerabilities (Windows)");
      script_summary(english:"Checks version of QuickTime on Windows");
    
      script_set_attribute(
        attribute:"synopsis",
        value:
    "The remote Windows host contains an application that is affected by
    multiple vulnerabilities."
      );
      script_set_attribute(
        attribute:"description",
        value:
    "The version of QuickTime installed on the remote Windows host is older
    than 7.6.6.  Such versions contain several vulnerabilities :
    
      - A heap-based buffer overflow in QuickTime's handling of
        PICT images may lead to an application crash or
        arbitrary code execution. (CVE-2009-2837)
    
      - A memory corruption issue in QuickTime's handling of
        QDM2 encoded audio content may lead to an application
        crash or arbitrary code execution. (CVE-2010-0059)
    
      - A memory corruption issue in QuickTime's handling of
        QDMC encoded audio content may lead to an application
        crash or arbitrary code execution. (CVE-2010-0060)
    
      - A heap-based buffer overflow in QuickTime's handling of
        H.263 encoded movie files may lead to an application
        crash or arbitrary code execution. (CVE-2010-0062)
    
      - A heap-based buffer overflow in QuickTime's handling of
        H.261 encoded movie files may lead to an application
        crash or arbitrary code execution. (CVE-2010-0514)
    
      - A memory corruption issue in QuickTime's handling of
        H.264 encoded movie files may lead to an application
        crash or arbitrary code execution. (CVE-2010-0515)
    
      - A heap-based buffer overflow in QuickTime's handling of
        RLE encoded movie files may lead to an application
        crash or arbitrary code execution. (CVE-2010-0516)
    
      - A heap-based buffer overflow in QuickTime's handling of
        M-JPEG encoded movie files may lead to an application
        crash or arbitrary code execution. (CVE-2010-0517)
    
      - A memory corruption issue in QuickTime's handling of
        Sorenson encoded movie files may lead to an application
        crash or arbitrary code execution. (CVE-2010-0518)
    
      - An integer overflow in QuickTime's handling of FlashPix
        encoded movie files may lead to an application crash or
        arbitrary code execution. (CVE-2010-0519)
    
      - A heap-based buffer overflow in QuickTime's handling of
        FLC encoded movie files may lead to an application crash
        or arbitrary code execution. (CVE-2010-0520)
    
      - A heap-based buffer overflow in QuickTime's handling of
        MPEG encoded movie files may lead to an application
        crash or arbitrary code execution. (CVE-2010-0526)
    
      - An integer overflow in QuickTime's handling of PICT
        images may lead to an application crash or arbitrary
        code execution. (CVE-2010-0527)
    
      - A memory corruption issue in QuickTime's handling of
        color tables in movie files may lead to an application
        crash or arbitrary code execution. (CVE-2010-0528)
    
      - A heap-based buffer overflow in QuickTime's handling of
        PICT images may lead to an application crash or
        arbitrary code execution. (CVE-2010-0529)
    
      - A memory corruption issue in QuickTime's handling of
        BMP images may lead to an application crash or arbitrary
        code execution. (CVE-2010-0536)"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.apple.com/kb/HT4104"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://lists.apple.com/archives/security-announce/2010/Mar/msg00002.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.securityfocus.com/advisories/19386"
      );
      script_set_attribute(
        attribute:"solution",
        value:"Upgrade to QuickTime 7.6.6 or later."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
      script_cwe_id(119);
      script_set_attribute(attribute:"vuln_publication_date", value:"2010/03/30");
      script_set_attribute(attribute:"patch_publication_date", value:"2010/03/30");
      script_set_attribute(attribute:"plugin_publication_date", value:"2010/03/31");
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:apple:quicktime");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Windows");
    
      script_copyright(english:"This script is Copyright (C) 2010-2018 Tenable Network Security, Inc.");
    
      script_dependencies("quicktime_installed.nasl");
      script_require_keys("SMB/QuickTime/Version");
    
      exit(0);
    }
    
    
    include("global_settings.inc");
    
    
    version_ui = get_kb_item("SMB/QuickTime/Version_UI");
    version = get_kb_item("SMB/QuickTime/Version");
    if (isnull(version)) exit(1, "The 'SMB/QuickTime/Version' KB item is missing.");
    
    if (isnull(version_ui)) version_report = version;
    else version_report = version_ui;
    
    ver = split(version, sep:'.', keep:FALSE);
    for (i=0; i<max_index(ver); i++)
      ver[i] = int(ver[i]);
    
    if (
      ver[0] < 7 || 
      (
        ver[0] == 7 && 
        (
          ver[1] < 66 ||
          (ver[1] == 66 && ver[2] < 71)
        )
      )
    )
    {
      if (report_verbosity > 0)
      {
        report = '\n' +
          'QuickTime ' + version_report + ' is currently installed on the remote host.\n';
        security_hole(port:get_kb_item("SMB/transport"), extra:report);
      }
      else security_hole(get_kb_item("SMB/transport"));
    }
    else exit(0, "The host is not affected since QuickTime "+version_report+" is installed.");
    
  • NASL familyMacOS X Local Security Checks
    NASL idMACOSX_10_6_3.NASL
    descriptionThe remote host is running a version of Mac OS X 10.6.x that is prior to 10.6.3. Mac OS X 10.6.3 contains security fixes for the following products : - AFP Server - Apache - CoreAudio - CoreMedia - CoreTypes - CUPS - DesktopServices - Disk Images - Directory Services - Dovecot - Event Monitor - FreeRADIUS - FTP Server - iChat Server - ImageIO - Image RAW - Libsystem - Mail - MySQL - OS Services - Password Server - PHP - Podcast Producer - Preferences - PS Normalizer - QuickTime - Ruby - Server Admin - SMB - Tomcat - Wiki Server - X11
    last seen2020-06-01
    modified2020-06-02
    plugin id45372
    published2010-03-29
    reporterThis script is Copyright (C) 2010-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/45372
    titleMac OS X 10.6.x < 10.6.3 Multiple Vulnerabilities
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    
    if (!defined_func("bn_random")) exit(0);
    if (NASL_LEVEL < 3000) exit(0);
    
    
    include("compat.inc");
    
    
    if (description)
    {
      script_id(45372);
      script_version("1.31");
      script_cvs_date("Date: 2018/07/16 12:48:31");
    
      script_cve_id(
        "CVE-2003-0063",
        "CVE-2006-1329",
        "CVE-2008-4456",
        "CVE-2008-5515",
        "CVE-2008-7247",
        "CVE-2009-0033",
        "CVE-2009-0580",
        "CVE-2009-0689",
        "CVE-2009-0781",
        "CVE-2009-0783",
        "CVE-2009-1904",
        "CVE-2009-2042",
        "CVE-2009-2417",
        "CVE-2009-2422",
        "CVE-2009-2446",
        "CVE-2009-2693",
        "CVE-2009-2901",
        "CVE-2009-2902",
        "CVE-2009-2906",
        "CVE-2009-3009",
        "CVE-2009-3095",
        "CVE-2009-3557",
        "CVE-2009-3558",
        "CVE-2009-3559",
        "CVE-2009-4017",
        "CVE-2009-4019",
        "CVE-2009-4030",
        "CVE-2009-4214",
        "CVE-2010-0041",
        "CVE-2010-0042",
        "CVE-2010-0043",
        "CVE-2010-0057",
        "CVE-2010-0059",
        "CVE-2010-0060",
        "CVE-2010-0062",
        "CVE-2010-0063",
        "CVE-2010-0064",
        "CVE-2010-0065",
        "CVE-2010-0393",
        "CVE-2010-0497",
        "CVE-2010-0498",
        "CVE-2010-0500",
        "CVE-2010-0501",
        "CVE-2010-0502",
        "CVE-2010-0504",
        "CVE-2010-0505",
        "CVE-2010-0507",
        "CVE-2010-0508",
        "CVE-2010-0509",
        "CVE-2010-0510",
        "CVE-2010-0511",
        "CVE-2010-0512",
        "CVE-2010-0513",
        "CVE-2010-0514",
        "CVE-2010-0515",
        "CVE-2010-0516",
        "CVE-2010-0517",
        "CVE-2010-0518",
        "CVE-2010-0519",
        "CVE-2010-0520",
        "CVE-2010-0521",
        "CVE-2010-0524",
        "CVE-2010-0525",
        "CVE-2010-0526",
        "CVE-2010-0533",
        "CVE-2010-0534",
        "CVE-2010-0535",
        "CVE-2010-0537"
      );
      script_bugtraq_id(
        6940,
        17155,
        31486,
        35193,
        35196,
        35233,
        35263,
        35278,
        35416,
        35510,
        35579,
        35609,
        36032,
        36278,
        36554,
        36555,
        36573,
        37075,
        37142,
        37297,
        37942,
        37944,
        37945,
        38043,
        38524,
        38673,
        38676,
        38677,
        39151,
        39153,
        39157,
        39160,
        39161,
        39171,
        39172,
        39175,
        39194,
        39230,
        39231,
        39232,
        39234,
        39236,
        39252,
        39255,
        39256,
        39258,
        39264,
        39268,
        39273,
        39274,
        39278,
        39279,
        39281,
        39291
      );
    
      script_name(english:"Mac OS X 10.6.x < 10.6.3 Multiple Vulnerabilities");
      script_summary(english:"Check the version of Mac OS X");
    
      script_set_attribute(
        attribute:"synopsis",
        value:
    "The remote host is missing a Mac OS X update that fixes various
    security issues."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "The remote host is running a version of Mac OS X 10.6.x that is prior
    to 10.6.3.
    
    Mac OS X 10.6.3 contains security fixes for the following products :
    
      - AFP Server
      - Apache
      - CoreAudio
      - CoreMedia
      - CoreTypes
      - CUPS
      - DesktopServices
      - Disk Images
      - Directory Services
      - Dovecot
      - Event Monitor
      - FreeRADIUS
      - FTP Server
      - iChat Server
      - ImageIO
      - Image RAW
      - Libsystem
      - Mail
      - MySQL
      - OS Services
      - Password Server
      - PHP
      - Podcast Producer
      - Preferences
      - PS Normalizer
      - QuickTime
      - Ruby
      - Server Admin
      - SMB
      - Tomcat
      - Wiki Server
      - X11"
      );
      script_set_attribute(
        attribute:"see_also", 
        value:"http://support.apple.com/kb/HT4077"
      );
      script_set_attribute(
        attribute:"see_also", 
        value:"http://lists.apple.com/archives/security-announce/2010/Mar/msg00001.html"
      );
      script_set_attribute(
        attribute:"see_also", 
        value:"http://www.securityfocus.com/advisories/19364"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Upgrade to Mac OS X 10.6.3 or later."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
      script_set_attribute(attribute:"exploit_framework_core", value:"true");
      script_set_attribute(attribute:"exploited_by_malware", value:"true");
      script_set_attribute(attribute:"exploit_framework_canvas", value:"true");
      script_set_attribute(attribute:"canvas_package", value:'D2ExploitPack');
      script_cwe_id(20, 22, 59, 79, 119, 134, 189, 200, 264, 287, 310);
    script_set_attribute(attribute:"vuln_publication_date", value:"2010/03/29");
      script_set_attribute(attribute:"patch_publication_date", value:"2010/03/29");
      script_set_attribute(attribute:"plugin_publication_date", value:"2010/03/29");
      script_set_attribute(attribute:"plugin_type", value:"combined");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:apple:mac_os_x");
      script_end_attributes();
     
      script_category(ACT_GATHER_INFO);
      script_family(english:"MacOS X Local Security Checks");
     
      script_copyright(english:"This script is Copyright (C) 2010-2018 Tenable Network Security, Inc.");
     
      script_dependencies("ssh_get_info.nasl", "os_fingerprint.nasl");
    
     exit(0);
    }
    
    
    os = get_kb_item("Host/MacOSX/Version");
    if (!os)
    {
      os = get_kb_item("Host/OS");
      c = get_kb_item("Host/OS/Confidence");
      if ( isnull(os) || c <= 70 ) exit(0);
    }
    if (!os) exit(1, "The 'Host/OS' KB item is missing.");
    
    
    if (ereg(pattern:"Mac OS X 10\.6($|\.[0-2]([^0-9]|$))", string:os)) security_hole(0);
    else exit(0, "The host is not affected as it is running "+os+".");
    
  • NASL familyMacOS X Local Security Checks
    NASL idMACOSX_QUICKTIME766.NASL
    descriptionThe version of QuickTime installed on the remote Mac OS X host is older than 7.6.6. Such versions contain several vulnerabilities : - A memory corruption issue in QuickTime
    last seen2020-06-01
    modified2020-06-02
    plugin id45387
    published2010-03-31
    reporterThis script is Copyright (C) 2010-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/45387
    titleQuickTime < 7.6.6 Multiple Vulnerabilities (Mac OS X)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    
    if (!defined_func("bn_random")) exit(0);
    if (NASL_LEVEL < 3000) exit(0);
    
    
    include("compat.inc");
    
    
    if (description)
    {
      script_id(45387);
      script_version("1.12");
    
      script_cve_id(
        "CVE-2010-0059",
        "CVE-2010-0060",
        "CVE-2010-0062",
        "CVE-2010-0514",
        "CVE-2010-0515",
        "CVE-2010-0516",
        "CVE-2010-0517",
        "CVE-2010-0518",
        "CVE-2010-0519",
        "CVE-2010-0520",
        "CVE-2010-0526"
      );
      script_bugtraq_id(
        39152,
        39154,
        39155,
        39159,
        39161,
        39163,
        39164,
        39165,
        39166,
        39167
      );
    
      script_name(english:"QuickTime < 7.6.6 Multiple Vulnerabilities (Mac OS X)");
      script_summary(english:"Checks version of QuickTime on Mac OS X");
    
      script_set_attribute(
        attribute:"synopsis",
        value:
    "The remote Mac OS X host contains an application that is affected by
    multiple vulnerabilities."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "The version of QuickTime installed on the remote Mac OS X host is
    older than 7.6.6.  Such versions contain several vulnerabilities :
    
      - A memory corruption issue in QuickTime's handling of
        QDM2 encoded audio content may lead to an application 
        crash or arbitrary code execution. (CVE-2010-0059)
    
      - A memory corruption issue in QuickTime's handling of
        QDMC encoded audio content may lead to an application 
        crash or arbitrary code execution. (CVE-2010-0060)
    
      - A heap buffer overflow in QuickTime's handling of H.263
        encoded movie files may lead to an application crash or
        arbitrary code execution. (CVE-2010-0062)
    
      - A heap buffer overflow in QuickTime's handling of H.261
        encoded movie files may lead to an application crash or
        arbitrary code execution. (CVE-2010-0514)
    
      - A memory corruption issue in QuickTime's handling of
        H.264 encoded movie files may lead to an application 
        crash or arbitrary code execution. (CVE-2010-0515)
    
      - A heap buffer overflow in QuickTime's handling of RLE
        encoded movie files may lead to an application crash or
        arbitrary code execution. (CVE-2010-0516)
    
      - A heap buffer overflow in QuickTime's handling of M-JPEG
        encoded movie files may lead to an application crash or
        arbitrary code execution. (CVE-2010-0517)
    
      - A memory corruption issue in QuickTime's handling of
        Sorenson encoded movie files may lead to an application
        crash or arbitrary code execution. (CVE-2010-0518)
    
      - An integer overflow in QuickTime's handling of FlashPix
        encoded movie files may lead to an application crash or
        arbitrary code execution. (CVE-2010-0519)
    
      - A heap buffer overflow in QuickTime's handling of FLC
        encoded movie files may lead to an application crash or
        arbitrary code execution. (CVE-2010-0520)
    
      - A heap buffer overflow in QuickTime's handling of MPEG
        encoded movie files may lead to an application crash or
        arbitrary code execution. (CVE-2010-0526)"
      );
      script_set_attribute(
        attribute:"see_also", 
        value:"http://support.apple.com/kb/HT4104"
      );
      script_set_attribute(
        attribute:"see_also", 
        value:"http://lists.apple.com/archives/security-announce/2010/Mar/msg00002.html"
      );
      script_set_attribute(
        attribute:"see_also", 
        value:"http://www.securityfocus.com/advisories/19386"
      );
      script_set_attribute(
        attribute:"solution",
        value:"Upgrade to QuickTime 7.6.6 or later."
      );
     script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
     script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
     script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
     script_set_attribute(attribute:"exploit_available", value:"true");
      script_set_attribute(attribute:"vuln_publication_date", value:"2010/03/30");
      script_set_attribute(attribute:"patch_publication_date", value:"2010/03/30");
      script_set_attribute(attribute:"plugin_publication_date", value:"2010/03/31");
     script_cvs_date("Date: 2018/07/14  1:59:35");
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:apple:quicktime");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"MacOS X Local Security Checks");
    
      script_copyright(english:"This script is Copyright (C) 2010-2018 Tenable Network Security, Inc.");
    
      script_dependencies("macosx_Quicktime652.nasl", "ssh_get_info.nasl");
      script_require_keys("MacOSX/QuickTime/Version", "Host/uname");
    
      exit(0);
    }
    
    
    include("global_settings.inc");
    
    
    uname = get_kb_item("Host/uname");
    if (!uname) exit(1, "The 'Host/uname' KB item is missing.");
    
    pat = "^.+Darwin.* ([0-9]+\.[0-9.]+).*$";
    if (!ereg(pattern:pat, string:uname)) exit(1, "Can't identify the Darwin kernel version from the uname output ("+uname+").");
    
    darwin = ereg_replace(pattern:pat, replace:"\1", string:uname);
    if (ereg(pattern:"^[0-8]\.", string:darwin)) exit(0, "The host is running Darwin kernel version "+darwin+", which is no longer supported by Apple.");
    
    version = get_kb_item("MacOSX/QuickTime/Version");
    if (isnull(version)) exit(1, "The 'MacOSX/QuickTime/Version' KB item is missing.");
    
    ver = split(version, sep:'.', keep:FALSE);
    for (i=0; i<max_index(ver); i++)
      ver[i] = int(ver[i]);
    
    if (
      ver[0] < 7 || 
      (
        ver[0] == 7 && 
        (
          ver[1] < 6 ||
          (ver[1] == 6 && ver[2] < 6)
        )
      )
    )
    {
      if (report_verbosity > 0)
      {
        report = '\n' +
          'QuickTime ' + version + ' is currently installed on the remote host.\n';
        security_hole(port:0, extra:report);
      }
      else security_hole(0);
    }
    else exit(0, "The host is not affected since QuickTime "+version+" is installed.");
    

Oval

accepted2013-07-29T04:01:55.551-04:00
classvulnerability
contributors
  • nameJ. Daniel Brown
    organizationDTCC
  • nameShane Shaffer
    organizationG2, Inc.
  • nameShane Shaffer
    organizationG2, Inc.
  • nameMaria Kedovskaya
    organizationALTX-SOFT
definition_extensions
commentApple QuickTime is installed
ovaloval:org.mitre.oval:def:12443
descriptionInteger overflow in QuickTime in Apple Mac OS X before 10.6.3 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a FlashPix image with a malformed SubImage Header Stream containing a NumberOfTiles field with a large value.
familywindows
idoval:org.mitre.oval:def:7498
statusaccepted
submitted2010-04-06T10:30:00.000-05:00
titleApple QuickTime Before 7.6.6 FlashPix Encoded Movie Handling Integer Overflow Vulnerability
version10

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/93454/moaub-quicktime.txt
idPACKETSTORM:93454
last seen2016-12-05
published2010-09-03
reporterAbysssec
sourcehttps://packetstormsecurity.com/files/93454/Month-Of-Abysssec-Undisclosed-Bugs-Apple-QuickTime-FlashPix.html
titleMonth Of Abysssec Undisclosed Bugs - Apple QuickTime FlashPix

Seebug

bulletinFamilyexploit
descriptionNo description provided by source.
idSSV:69757
last seen2017-11-19
modified2014-07-01
published2014-07-01
reporterRoot
sourcehttps://www.seebug.org/vuldb/ssvid-69757
titleApple QuickTime FlashPix NumberOfTiles - Remote Code Execution Vulnerability