var-200605-0213
Vulnerability from variot

Heap-based buffer overflow in Apple QuickTime before 7.1 allows remote attackers to execute arbitrary code via a crafted QuickDraw PICT image format file with malformed image data. Multiple integer-overflow and buffer-overflow vulnerabilities affect QuickTime. Successful exploits will result in the execution of arbitrary code in the context of the currently logged-in user. Failed exploit attempts will likely cause denial-of-service conditions. Apple Mac OS X is reported prone to multiple security vulnerabilities. These issue affect Mac OS X in the following applications or modules: - AppKit - ImageIO - BOM - CFNetwork - ClamAV - CoreFoundation - CoreGraphics - Finder - FTPServer - Flash Player - ImageIO - Keychain - LaunchServices - libcurl - Mail - MySQL Manager - Preview - QuickDraw - QuickTime Streaming Server - Ruby - Safari A remote attacker may exploit these issues to execute arbitrary code, trigger a denial-of-service condition, gain access to potentially sensitive information, or overwrite files. Other attacks may also be possible. Apple Mac OS X 10.4.6 and prior are reported vulnerable to these issues. Apple QuickTime is a popular multimedia player that supports a wide variety of media formats. Malformed font information may cause stack overflow, and malformed graphics data may cause heap overflow. An attacker could exploit these vulnerabilities by convincing a user to access a specially crafted image or media file with a vulnerable version of QuickTime. Since QuickTime configures most web browsers to handle QuickTime media files, an attacker could exploit these vulnerabilities using a web page.

Disable QuickTime in your web browser

An attacker may be able to exploit this vulnerability by persuading a user to access a specially crafted file with a web browser. Disabling QuickTime in your web browser will defend against this attack vector. For more information, refer to the Securing Your Web Browser document.

Appendix A. ______________

McAfee, Inc. McAfee Avert\x99 Labs Security Advisory Public Release Date: 2006-05-11

Apple QuickDraw/QuickTime Multiple Vulnerabilities

CVE-2006-1249, CVE-2006-1453, CVE-2006-1454, CVE-2006-1459, CVE-2006-1460, CVE-2006-1461, CVE-2006-1462, CVE-2006-1464, CVE-2006-1465


  • Synopsis

Apple QuickTime and Apple QuickDraw are multimedia technologies used to process image, audio and video data.

Twenty one code execution vulnerabilities are present in QuickTime support for various multimedia formats including: MOV, H.264, MPEG 4, AVI, FPX and SWF. In order for an attack to succeed user interaction is required and therefore the risk factor for these issues is medium.

CVE-2006-1459

Seven integer overflow vulnerabilities are present in QuickTime MOV video format support.

CVE-2006-1460

Five buffer overflow vulnerabilities are present in QuickTime MOV video format support.

CVE-2006-1461

Two buffer overflow vulnerabilities are present in QuickTime Flash (SWF) support.

CVE-2006-1462

Three integer overflow vulnerabilities are presenting QuickTime H.264 (M4V) video format support.

CVE-2006-1464

One buffer overflow vulnerability is present in QuickTime MPEG4 (M4P) video format support.

CVE-2006-1465

One buffer overflow vulnerability is present in QuickTime AVI video format support.


  • Legal Notice

Copyright (C) 2006 McAfee, Inc. The information contained within this advisory is provided for the convenience of McAfee\x92s customers, and may be redistributed provided that no fee is charged for distribution and that the advisory is not modified in any way. McAfee makes no representations or warranties regarding the accuracy of the information referenced in this document, or the suitability of that information for your purposes.

McAfee, Inc. and/or its affiliated companies in the United States and/or other Countries. All other registered and unregistered trademarks in this document are the sole property of their respective owners.


.

1) An error in the AppKit framework allows an application to read characters entered into secure text field in the same window session.

2) Errors in the AppKit and ImageIO framework when processing GIF and TIFF images can be exploited to crash an application or potentially execute arbitrary code.

For more information: SA19686

3) A boundary error within the BOM component when expanding archives can be exploited to crash an application or potentially execute arbitrary code.

For more information: SA19686

4) An input validation error in the BOM component when expanding archives can be exploited to cause files to be written to arbitrary locations outside the specified directory via directory traversal attacks.

5) An integer overflow error in the CFNetwork component when handling chunked transfer encoding may allow execution of arbitrary code if a user is tricked into visiting a malicious web site.

For more information: SA19534

7) An error in the CoreFoundation component allows dynamic libraries to load and execute when a bundle is registered. This can be exploited to execute arbitrary code if an untrusted bundle is registered.

8) An integer underflow error within the "CFStringGetFileSystemRepresentation()" API during string conversion may allow execution of arbitrary code.

9) An error in the CoreGraphics component allows an application in the same window session to read characters entered into secure text field when "Enable access for assistive devices" is enabled.

10) An error in Finder within the handling of Internet Location items makes it possible to specify a different Internet Location type than the actual URL scheme used.

11) Boundary errors in the FTPServer component when handling path names can be exploited to malicious users to cause a buffer overflow, which may allow execution of arbitrary code.

12) Various errors in the Flash Player makes it possible to compromise a user's system via specially crafted Flash files.

For more information: SA17430 SA19218

13) An integer overflow error in the ImageIO framework when processing JPEG images can be exploited to crash an application or potentially execute arbitrary code.

14) An error in the Keychain component allows an application to use Keychain items even when the Keychain is locked. This requires that the application has obtained a reference to a Keychain item before the Keychain was locked.

15) An error in the LaunchServices component when processing long filename extensions may allow bypassing of the Download Validation functionality.

16) Boundary errors in the libcurl URL handling may allow execution of arbitrary code.

For more information: SA17907

17) An integer overflow error in the Mail component may allow execution of arbitrary code when viewing a specially crafted email message with MacMIME encapsulated attachments.

18) An error in the Mail component when handling invalid colour information in enriched text email messages may allow execution of arbitrary code.

19) An design error in MySQL Manager makes it possible to access the MySQL database with an empty password as the MySQL password supplying during initial setup is not used. This can be exploited to crash an application and potentially execute arbitrary code.

22) A NULL pointer dereference error in QuickTime Streaming Server when processing QuickTime movies with a missing track can be exploited to crash the application.

23) A boundary error in QuickTime Streaming Server when processing RTSP requests can be exploited to crash the application or potentially execute arbitrary code.

24) An error in Ruby can be exploited to bypass safe level restrictions.

For more information: SA16904

25) An error in Safari when handling archives with symbolic links may place the symbolic links on a user's desktop. This requires that the "Open 'safe' files after downloading" option is enabled.

SOLUTION: Apply Security Update 2006-003. 13) The vendor credits Brent Simmons, NewsGator Technologies. 14) The vendor credits Tobias Hahn, HU Berlin. 19) The vendor credits Ben Low, University of New South Wales. 21) The vendor credits Mike Price, McAfee AVERT Labs. 23) Mu Security research team

ORIGINAL ADVISORY: Apple: http://docs.info.apple.com/article.html?artnum=303737

OTHER REFERENCES: SA19686: http://secunia.com/advisories/19686/

SA19534: http://secunia.com/advisories/19534/

SA17430: http://secunia.com/advisories/17430/

SA19218: http://secunia.com/advisories/19218/

SA17907: http://secunia.com/advisories/17907/

SA16904: http://secunia.com/advisories/16904/


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


. Impacts of other vulnerabilities include bypassing security restrictions and denial of service. Further details are available in the individual Vulnerability Notes.

II. Impact

The impacts of these vulnerabilities vary. For information about specific impacts, please see the Vulnerability Notes. Potential consequences include remote execution of arbitrary code or commands, bypass of security restrictions, and denial of service.

III. This and other updates are available via Apple Update. Please see the Vulnerability Notes for individual reporter acknowledgements.


The most recent version of this document can be found at:

 <http://www.us-cert.gov/cas/techalerts/TA06-132A.html>

Feedback can be directed to US-CERT Technical Staff. Please send email to cert@cert.org with "TA06-132A Feedback VU#519473" in the subject.


For instructions on subscribing to or unsubscribing from this mailing list, visit http://www.us-cert.gov/cas/signup.html.


Produced 2006 by US-CERT, a government organization.

Terms of use:

 <http://www.us-cert.gov/legal.html>

Revision History

May 12, 2006: Initial release

-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux)

iQEVAwUBRGTxnX0pj593lg50AQKebgf+PTa7qCt6QQRcXGlJ3vjPFOdO1VNRMGr8 WOP8JKHbCK93O3E6YtHJ3nQTJBfyq169TQijWvoWvjjXM603DojGXUXgTBZFhTSG c4L0jE2+nD3273nZXGPreFJAsPxK6me7d4Of/KQ/prJnUfrnWNxfrP90CmXRKNLD +4eC4BEjNXCqpb0ki62WQM7NED6IgfgNZWfO7faTSRYNRdEyLAgetQxZVm5eepyK BJO3rRBBRkOIkIIG5o/J5ViqgiuUP75N37QqTc7BtyzQR2OeWepytJvkMvJUBVAG r0fLUKvhT4wdHxsNGVGCxLNf3NHG1UuWNO3UZ9MeBmREdmeT+K0l9A== =cabu -----END PGP SIGNATURE----- . http://www.apple.com/support/downloads/quicktime71.html

PROVIDED AND/OR DISCOVERED BY: 1) Reported by the vendor

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200605-0213",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "quicktime",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "apple",
        "version": "7.0.4"
      },
      {
        "model": "quicktime",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "apple",
        "version": "7.0.3"
      },
      {
        "model": "quicktime player",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "7.0.4"
      },
      {
        "model": "quicktime player",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "7.0.3"
      },
      {
        "model": "quicktime player",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "7.0.2"
      },
      {
        "model": "quicktime player",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "7.0.1"
      },
      {
        "model": "quicktime player",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "7.0"
      },
      {
        "model": "quicktime player",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "6.5.2"
      },
      {
        "model": "quicktime player",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "6.5.1"
      },
      {
        "model": "quicktime player",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "6.5"
      },
      {
        "model": "quicktime player",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "6.1"
      },
      {
        "model": "quicktime player",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "6"
      },
      {
        "model": "quicktime player",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "apple",
        "version": "7.1"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.8"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.1.1"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.5"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.2"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.0.4"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.10"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.9"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.5"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.1.2"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.4"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.5"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.6"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.6"
      },
      {
        "model": "directory pro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cosmicperl",
        "version": "10.0.3"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.1"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.5.1"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.1"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.4"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.6"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.7"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.03"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.11"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.1"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.8"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.9"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.8"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.1.4"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.1.3"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.7"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.4"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.2"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.3"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.5"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.0"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.1.5"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.7"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.1"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.3"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.5.2"
      },
      {
        "model": "safari",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "2.0.2"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.2"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.3"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.8"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.5"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.0.1"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.1.1"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.10"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.2"
      },
      {
        "model": "safari",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "2.0.1"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.5"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.1.2"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.9"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.5"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.6"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.6"
      },
      {
        "model": "mobile safari",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "0"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.5.1"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.4"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.6"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.7"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.0.2"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.1"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.0.3"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.8"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.1"
      },
      {
        "model": "safari",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "2.0.3"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.1"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.9"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.7"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.8"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.1.4"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.1.3"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.4"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.5"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.2"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.4"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.3.3"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.1"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.0"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.3"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.5.2"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.1.5"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.7"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.2"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.3"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.4.11"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "17953"
      },
      {
        "db": "BID",
        "id": "17951"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200605-254"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-1454"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Mike Price ATmaCA atmaca@atmacasoft.com http://www.zerodayinitiative.com/ Sowhat smaillist@gmail.com",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200605-254"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2006-1454",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.1,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 4.9,
            "id": "CVE-2006-1454",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.0,
            "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.1,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 4.9,
            "id": "VHN-17562",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:H/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2006-1454",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200605-254",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-17562",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-17562"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200605-254"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-1454"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Heap-based buffer overflow in Apple QuickTime before 7.1 allows remote attackers to execute arbitrary code via a crafted QuickDraw PICT image format file with malformed image data. Multiple integer-overflow and buffer-overflow vulnerabilities affect QuickTime. \nSuccessful exploits will result in the execution of arbitrary code in the context of the currently logged-in user. Failed exploit attempts will likely cause denial-of-service conditions. Apple Mac OS X is reported prone to multiple security vulnerabilities. \nThese issue affect Mac OS X in the following applications or modules:\n- AppKit\n- ImageIO\n- BOM\n- CFNetwork\n- ClamAV\n- CoreFoundation\n- CoreGraphics\n- Finder\n- FTPServer\n- Flash Player\n- ImageIO\n- Keychain\n- LaunchServices\n- libcurl\n- Mail\n- MySQL Manager\n- Preview\n- QuickDraw\n- QuickTime Streaming Server\n- Ruby\n- Safari\nA remote attacker may exploit these issues to execute arbitrary code, trigger a denial-of-service condition, gain access to potentially sensitive information, or overwrite files. Other attacks may also be possible. \nApple Mac OS X 10.4.6 and prior are reported vulnerable to these issues. Apple QuickTime is a popular multimedia player that supports a wide variety of media formats. Malformed font information may cause stack overflow, and malformed graphics data may cause heap overflow. An attacker\n   could exploit these vulnerabilities by convincing a user to access\n   a specially crafted image or media file with a vulnerable version\n   of QuickTime. Since QuickTime configures most web browsers to\n   handle QuickTime media files, an attacker could exploit these\n   vulnerabilities using a web page. \n\nDisable QuickTime in your web browser\n\n   An attacker may be able to exploit this vulnerability by persuading\n   a user to access a specially crafted file with a web\n   browser. Disabling QuickTime in your web browser will defend\n   against this attack vector.  For more information, refer to the\n   Securing Your Web Browser document. \n\n\nAppendix A. ____________________________________________________________________\n\nMcAfee, Inc. \nMcAfee Avert\\x99 Labs Security Advisory\nPublic Release Date: 2006-05-11\n\nApple QuickDraw/QuickTime Multiple Vulnerabilities\n\nCVE-2006-1249, CVE-2006-1453, CVE-2006-1454, CVE-2006-1459, CVE-2006-1460, CVE-2006-1461, CVE-2006-1462, CVE-2006-1464, CVE-2006-1465\n______________________________________________________________________\n\n* Synopsis\n\nApple QuickTime and Apple QuickDraw are multimedia technologies used to process image, audio and video data. \n\nTwenty one code execution vulnerabilities are present in QuickTime support for various multimedia formats including: MOV, H.264, MPEG 4, AVI, FPX and SWF. In order for an attack to succeed user interaction is required and therefore the risk factor for these issues is medium. \n\nCVE-2006-1459\n\nSeven integer overflow vulnerabilities are present in QuickTime MOV video format support. \n\nCVE-2006-1460\n\nFive buffer overflow vulnerabilities are present in QuickTime MOV video format support. \n\nCVE-2006-1461\n\nTwo buffer overflow vulnerabilities are present in QuickTime Flash (SWF) support. \n\nCVE-2006-1462\n\nThree integer overflow vulnerabilities are presenting QuickTime H.264 (M4V) video format support. \n\nCVE-2006-1464\n\nOne buffer overflow vulnerability is present in QuickTime MPEG4 (M4P) video format support. \n\nCVE-2006-1465\n\nOne buffer overflow vulnerability is present in QuickTime AVI video format support. \n\n______________________________________________________________________\n\n* Legal Notice\n\nCopyright (C) 2006 McAfee, Inc. \nThe information contained within this advisory is provided for the convenience of McAfee\\x92s customers, and may be redistributed provided that no fee is charged for distribution and that the advisory is not modified in any way. McAfee makes no representations or warranties regarding the accuracy of the information referenced in this document, or the suitability of that information for your purposes. \n\nMcAfee, Inc. and/or its affiliated companies in the United States and/or other Countries.  All other registered and unregistered trademarks in this document are the sole property of their respective owners. \n\n______________________________________________________________________\n. \n\n1) An error in the AppKit framework allows an application to read\ncharacters entered into secure text field in the same window\nsession. \n\n2) Errors in the AppKit and ImageIO framework when processing GIF and\nTIFF images can be exploited to crash an application or potentially\nexecute arbitrary code. \n\nFor more information:\nSA19686\n\n3) A boundary error within the BOM component when expanding archives\ncan be exploited to crash an application or potentially execute\narbitrary code. \n\nFor more information:\nSA19686\n\n4) An input validation error in the BOM component when expanding\narchives can be exploited to cause files to be written to arbitrary\nlocations outside the specified directory via directory traversal\nattacks. \n\n5) An integer overflow error in the CFNetwork component when handling\nchunked transfer encoding may allow execution of arbitrary code if a\nuser is tricked into visiting a malicious web site. \n\nFor more information:\nSA19534\n\n7) An error in the CoreFoundation component allows dynamic libraries\nto load and execute when a bundle is registered. This can be\nexploited to execute arbitrary code if an untrusted bundle is\nregistered. \n\n8) An integer underflow error within the\n\"CFStringGetFileSystemRepresentation()\" API during string conversion\nmay allow execution of arbitrary code. \n\n9) An error in the CoreGraphics component allows an application in\nthe same window session to read characters entered into secure text\nfield when \"Enable access for assistive devices\" is enabled. \n\n10) An error in Finder within the handling of Internet Location items\nmakes it possible to specify a different Internet Location type than\nthe actual URL scheme used. \n\n11) Boundary errors in the FTPServer component when handling path\nnames can be exploited to malicious users to cause a buffer overflow,\nwhich may allow execution of arbitrary code. \n\n12) Various errors in the Flash Player makes it possible to\ncompromise a user\u0027s system via specially crafted Flash files. \n\nFor more information:\nSA17430\nSA19218\n\n13) An integer overflow error in the ImageIO framework when\nprocessing JPEG images can be exploited to crash an application or\npotentially execute arbitrary code. \n\n14) An error in the Keychain component allows an application to use\nKeychain items even when the Keychain is locked. This requires that\nthe application has obtained a reference to a Keychain item before\nthe Keychain was locked. \n\n15) An error in the LaunchServices component when processing long\nfilename extensions may allow bypassing of the Download Validation\nfunctionality. \n\n16) Boundary errors in the libcurl URL handling may allow execution\nof arbitrary code. \n\nFor more information:\nSA17907\n\n17) An integer overflow error in the Mail component may allow\nexecution of arbitrary code when viewing a specially crafted email\nmessage with MacMIME encapsulated attachments. \n\n18) An error in the Mail component when handling invalid colour\ninformation in enriched text email messages may allow execution of\narbitrary code. \n\n19) An design error in MySQL Manager makes it possible to access the\nMySQL database with an empty password as the MySQL password supplying\nduring initial setup is not used. This can\nbe exploited to crash an application and potentially execute arbitrary\ncode. \n\n22) A NULL pointer dereference error in QuickTime Streaming Server\nwhen processing QuickTime movies with a missing track can be\nexploited to crash the application. \n\n23) A boundary error in QuickTime Streaming Server when processing\nRTSP requests can be exploited to crash the application or\npotentially execute arbitrary code. \n\n24) An error in Ruby can be exploited to bypass safe level\nrestrictions. \n\nFor more information:\nSA16904\n\n25) An error in Safari when handling archives with symbolic links may\nplace the symbolic links on a user\u0027s desktop. This requires that the\n\"Open \u0027safe\u0027 files after downloading\" option is enabled. \n\nSOLUTION:\nApply Security Update 2006-003. \n13) The vendor credits Brent Simmons, NewsGator Technologies. \n14) The vendor credits Tobias Hahn, HU Berlin. \n19) The vendor credits Ben Low, University of New South Wales. \n21) The vendor credits Mike Price, McAfee AVERT Labs. \n23) Mu Security research team\n\nORIGINAL ADVISORY:\nApple:\nhttp://docs.info.apple.com/article.html?artnum=303737\n\nOTHER REFERENCES:\nSA19686:\nhttp://secunia.com/advisories/19686/\n\nSA19534:\nhttp://secunia.com/advisories/19534/\n\nSA17430:\nhttp://secunia.com/advisories/17430/\n\nSA19218:\nhttp://secunia.com/advisories/19218/\n\nSA17907:\nhttp://secunia.com/advisories/17907/\n\nSA16904:\nhttp://secunia.com/advisories/16904/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. \n   Impacts of other vulnerabilities include bypassing security\n   restrictions and denial of service. Further details are available in the individual\n   Vulnerability Notes. \n\n\nII. Impact\n\n   The impacts of these vulnerabilities vary. For information about\n   specific impacts, please see the Vulnerability Notes. Potential\n   consequences include remote execution of arbitrary code or commands,\n   bypass of security restrictions, and denial of service. \n\n\nIII. This and other updates are\n   available via Apple Update. \n   Please see the Vulnerability Notes for individual reporter\n   acknowledgements. \n ____________________________________________________________________\n\n   The most recent version of this document can be found at:\n\n     \u003chttp://www.us-cert.gov/cas/techalerts/TA06-132A.html\u003e\n ____________________________________________________________________\n\n   Feedback can be directed to US-CERT Technical Staff. Please send\n   email to \u003ccert@cert.org\u003e with \"TA06-132A Feedback VU#519473\" in the\n   subject. \n ____________________________________________________________________\n\n   For instructions on subscribing to or unsubscribing from this\n   mailing list, visit \u003chttp://www.us-cert.gov/cas/signup.html\u003e. \n ____________________________________________________________________\n\n   Produced 2006 by US-CERT, a government organization. \n\n   Terms of use:\n\n     \u003chttp://www.us-cert.gov/legal.html\u003e\n ____________________________________________________________________\n\n\nRevision History\n\n   May 12, 2006: Initial release\n\n\n    \n    \n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.2.1 (GNU/Linux)\n\niQEVAwUBRGTxnX0pj593lg50AQKebgf+PTa7qCt6QQRcXGlJ3vjPFOdO1VNRMGr8\nWOP8JKHbCK93O3E6YtHJ3nQTJBfyq169TQijWvoWvjjXM603DojGXUXgTBZFhTSG\nc4L0jE2+nD3273nZXGPreFJAsPxK6me7d4Of/KQ/prJnUfrnWNxfrP90CmXRKNLD\n+4eC4BEjNXCqpb0ki62WQM7NED6IgfgNZWfO7faTSRYNRdEyLAgetQxZVm5eepyK\nBJO3rRBBRkOIkIIG5o/J5ViqgiuUP75N37QqTc7BtyzQR2OeWepytJvkMvJUBVAG\nr0fLUKvhT4wdHxsNGVGCxLNf3NHG1UuWNO3UZ9MeBmREdmeT+K0l9A==\n=cabu\n-----END PGP SIGNATURE-----\n. \nhttp://www.apple.com/support/downloads/quicktime71.html\n\nPROVIDED AND/OR DISCOVERED BY:\n1) Reported by the vendor",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2006-1454"
      },
      {
        "db": "BID",
        "id": "17953"
      },
      {
        "db": "BID",
        "id": "17951"
      },
      {
        "db": "VULHUB",
        "id": "VHN-17562"
      },
      {
        "db": "PACKETSTORM",
        "id": "46427"
      },
      {
        "db": "PACKETSTORM",
        "id": "46419"
      },
      {
        "db": "PACKETSTORM",
        "id": "46266"
      },
      {
        "db": "PACKETSTORM",
        "id": "46436"
      },
      {
        "db": "PACKETSTORM",
        "id": "46260"
      }
    ],
    "trust": 1.98
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2006-1454",
        "trust": 2.4
      },
      {
        "db": "BID",
        "id": "17953",
        "trust": 2.0
      },
      {
        "db": "BID",
        "id": "17951",
        "trust": 2.0
      },
      {
        "db": "SECUNIA",
        "id": "20069",
        "trust": 1.9
      },
      {
        "db": "USCERT",
        "id": "TA06-132A",
        "trust": 1.8
      },
      {
        "db": "USCERT",
        "id": "TA06-132B",
        "trust": 1.8
      },
      {
        "db": "SECUNIA",
        "id": "20077",
        "trust": 1.8
      },
      {
        "db": "SECTRACK",
        "id": "1016075",
        "trust": 1.7
      },
      {
        "db": "SECTRACK",
        "id": "1016067",
        "trust": 1.7
      },
      {
        "db": "SREASON",
        "id": "887",
        "trust": 1.7
      },
      {
        "db": "VUPEN",
        "id": "ADV-2006-1779",
        "trust": 1.7
      },
      {
        "db": "VUPEN",
        "id": "ADV-2006-1778",
        "trust": 1.7
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200605-254",
        "trust": 0.7
      },
      {
        "db": "CERT/CC",
        "id": "TA06-132A",
        "trust": 0.6
      },
      {
        "db": "CERT/CC",
        "id": "TA06-132B",
        "trust": 0.6
      },
      {
        "db": "APPLE",
        "id": "APPLE-SA-2006-05-11",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20060512 APPLE QUICKDRAW/QUICKTIME MULTIPLE VULNERABILITIES",
        "trust": 0.6
      },
      {
        "db": "XF",
        "id": "26401",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-17562",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "46427",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "46419",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "46266",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "46436",
        "trust": 0.1
      },
      {
        "db": "ZDI",
        "id": "ZDI-06-015",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "46260",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-17562"
      },
      {
        "db": "BID",
        "id": "17953"
      },
      {
        "db": "BID",
        "id": "17951"
      },
      {
        "db": "PACKETSTORM",
        "id": "46427"
      },
      {
        "db": "PACKETSTORM",
        "id": "46419"
      },
      {
        "db": "PACKETSTORM",
        "id": "46266"
      },
      {
        "db": "PACKETSTORM",
        "id": "46436"
      },
      {
        "db": "PACKETSTORM",
        "id": "46260"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200605-254"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-1454"
      }
    ]
  },
  "id": "VAR-200605-0213",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-17562"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-11-23T20:32:58.653000Z",
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-119",
        "trust": 1.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-17562"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-1454"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.7,
        "url": "http://lists.apple.com/archives/security-announce/2006/may/msg00002.html"
      },
      {
        "trust": 1.7,
        "url": "http://lists.apple.com/archives/security-announce/2006/may/msg00003.html"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/17951"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/17953"
      },
      {
        "trust": 1.7,
        "url": "http://www.us-cert.gov/cas/techalerts/ta06-132a.html"
      },
      {
        "trust": 1.7,
        "url": "http://www.us-cert.gov/cas/techalerts/ta06-132b.html"
      },
      {
        "trust": 1.7,
        "url": "http://securitytracker.com/id?1016067"
      },
      {
        "trust": 1.7,
        "url": "http://securitytracker.com/id?1016075"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/20069"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/20077"
      },
      {
        "trust": 1.7,
        "url": "http://securityreason.com/securityalert/887"
      },
      {
        "trust": 1.1,
        "url": "http://www.securityfocus.com/archive/1/433831/100/0/threaded"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2006/1778"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2006/1779"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26401"
      },
      {
        "trust": 0.6,
        "url": "http://www.frsirt.com/english/advisories/2006/1779"
      },
      {
        "trust": 0.6,
        "url": "http://www.frsirt.com/english/advisories/2006/1778"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/archive/1/archive/1/433831/100/0/threaded"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/26401"
      },
      {
        "trust": 0.4,
        "url": "http://docs.info.apple.com/article.html?artnum=303752"
      },
      {
        "trust": 0.4,
        "url": "http://docs.info.apple.com/article.html?artnum=303737"
      },
      {
        "trust": 0.3,
        "url": "http://www.apple.com/quicktime/"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/433850"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/433810"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/433828"
      },
      {
        "trust": 0.3,
        "url": "http://labs.musecurity.com/advisories/mu-200605-02.txt"
      },
      {
        "trust": 0.3,
        "url": "http://www.lists.apple.com/mhonarc/security-announce"
      },
      {
        "trust": 0.3,
        "url": "http://www.info.apple.com/usen/security/security_updates.html"
      },
      {
        "trust": 0.3,
        "url": "http://www.apple.com/macosx/"
      },
      {
        "trust": 0.2,
        "url": "http://www.us-cert.gov/legal.html\u003e"
      },
      {
        "trust": 0.2,
        "url": "http://docs.info.apple.com/article.html?artnum=106704\u003e"
      },
      {
        "trust": 0.2,
        "url": "http://www.us-cert.gov/cas/signup.html\u003e."
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/secunia_security_advisories/"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/about_secunia_advisories/"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://www.apple.com/quicktime/download/standalone.html\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://www.kb.cert.org/vuls/byid?searchview\u0026query=quicktime_7.1\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://docs.info.apple.com/article.html?artnum=303752\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://www.us-cert.gov/cas/techalerts/ta06-132b.html\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://www.apple.com/support/downloads/quicktime71.html\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://www.us-cert.gov/reading_room/securing_browser/\u003e"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2006-1461"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2006-1464"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2006-1453"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2006-1462"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2006-1454"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2006-1465"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2006-1459"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2006-1460"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2006-1249"
      },
      {
        "trust": 0.1,
        "url": "http://www.apple.com/support/downloads/securityupdate20060031039server.html"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/17430/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/16904/"
      },
      {
        "trust": 0.1,
        "url": "http://www.apple.com/support/downloads/securityupdate2006003macosx1046clientppc.html"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/19534/"
      },
      {
        "trust": 0.1,
        "url": "http://www.apple.com/support/downloads/securityupdate20060031039client.html"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/19686/"
      },
      {
        "trust": 0.1,
        "url": "http://www.apple.com/support/downloads/securityupdate2006003macosx1046clientintel.html"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/19218/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/96/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/20077/"
      },
      {
        "trust": 0.1,
        "url": "http://www.apple.com/support/downloads/securityupdate20060031046server.html"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/17907/"
      },
      {
        "trust": 0.1,
        "url": "http://docs.info.apple.com/article.html?artnum=303737\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://www.us-cert.gov/cas/techalerts/ta06-132a.html\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://www.us-cert.gov/reading_room/securing_browser/#safari\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://www.apple.com/support/downloads/quicktime71.html"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/5090/"
      },
      {
        "trust": 0.1,
        "url": "http://www.zerodayinitiative.com/advisories/zdi-06-015.html"
      },
      {
        "trust": 0.1,
        "url": "http://secway.org/advisory/ad20060512.txt"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/810/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/20069/"
      },
      {
        "trust": 0.1,
        "url": "http://www.eeye.com/html/research/advisories/ad20060511.html"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/7923/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/215/"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-17562"
      },
      {
        "db": "BID",
        "id": "17953"
      },
      {
        "db": "BID",
        "id": "17951"
      },
      {
        "db": "PACKETSTORM",
        "id": "46427"
      },
      {
        "db": "PACKETSTORM",
        "id": "46419"
      },
      {
        "db": "PACKETSTORM",
        "id": "46266"
      },
      {
        "db": "PACKETSTORM",
        "id": "46436"
      },
      {
        "db": "PACKETSTORM",
        "id": "46260"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200605-254"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-1454"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-17562"
      },
      {
        "db": "BID",
        "id": "17953"
      },
      {
        "db": "BID",
        "id": "17951"
      },
      {
        "db": "PACKETSTORM",
        "id": "46427"
      },
      {
        "db": "PACKETSTORM",
        "id": "46419"
      },
      {
        "db": "PACKETSTORM",
        "id": "46266"
      },
      {
        "db": "PACKETSTORM",
        "id": "46436"
      },
      {
        "db": "PACKETSTORM",
        "id": "46260"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200605-254"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-1454"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2006-05-12T00:00:00",
        "db": "VULHUB",
        "id": "VHN-17562"
      },
      {
        "date": "2006-05-11T00:00:00",
        "db": "BID",
        "id": "17953"
      },
      {
        "date": "2006-05-11T00:00:00",
        "db": "BID",
        "id": "17951"
      },
      {
        "date": "2006-05-22T00:50:08",
        "db": "PACKETSTORM",
        "id": "46427"
      },
      {
        "date": "2006-05-21T22:28:33",
        "db": "PACKETSTORM",
        "id": "46419"
      },
      {
        "date": "2006-05-17T05:39:52",
        "db": "PACKETSTORM",
        "id": "46266"
      },
      {
        "date": "2006-05-22T03:14:36",
        "db": "PACKETSTORM",
        "id": "46436"
      },
      {
        "date": "2006-05-17T05:39:52",
        "db": "PACKETSTORM",
        "id": "46260"
      },
      {
        "date": "2005-11-07T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200605-254"
      },
      {
        "date": "2006-05-12T20:06:00",
        "db": "NVD",
        "id": "CVE-2006-1454"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-10-18T00:00:00",
        "db": "VULHUB",
        "id": "VHN-17562"
      },
      {
        "date": "2006-05-15T22:29:00",
        "db": "BID",
        "id": "17953"
      },
      {
        "date": "2008-03-19T14:40:00",
        "db": "BID",
        "id": "17951"
      },
      {
        "date": "2006-05-24T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200605-254"
      },
      {
        "date": "2024-11-21T00:08:53.973000",
        "db": "NVD",
        "id": "CVE-2006-1454"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "46427"
      },
      {
        "db": "PACKETSTORM",
        "id": "46436"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200605-254"
      }
    ],
    "trust": 0.8
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Apple QuickTime QuickDraw Heap overflow vulnerability",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200605-254"
      }
    ],
    "trust": 0.6
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "buffer overflow",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200605-254"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…