var-200605-0220
Vulnerability from variot
Multiple buffer overflows in Apple QuickTime before 7.1 allow remote attackers to execute arbitrary code via a crafted QuickTime Flash (SWF) file. Multiple integer-overflow and buffer-overflow vulnerabilities affect QuickTime. These issues affect both Mac OS X and Microsoft Windows releases of the software. Successful exploits will result in the execution of arbitrary code in the context of the currently logged-in user. Failed exploit attempts will likely cause denial-of-service conditions. Apple QuickTime is a popular multimedia player that supports a wide variety of media formats. An attacker could exploit these vulnerabilities by convincing a user to access a specially crafted image or media file with a vulnerable version of QuickTime. Since QuickTime configures most web browsers to handle QuickTime media files, an attacker could exploit these vulnerabilities using a web page.
For more information, please refer to the Vulnerability Notes.
II. For further information, please see the Vulnerability Notes.
III.
Disable QuickTime in your web browser
An attacker may be able to exploit this vulnerability by persuading a user to access a specially crafted file with a web browser. Disabling QuickTime in your web browser will defend against this attack vector. For more information, refer to the Securing Your Web Browser document.
Appendix A. Please send email to cert@cert.org with "TA06-132B Feedback VU#289705" in the subject.
For instructions on subscribing to or unsubscribing from this mailing list, visit http://www.us-cert.gov/cas/signup.html.
Produced 2006 by US-CERT, a government organization.
Terms of use:
<http://www.us-cert.gov/legal.html>
Revision History
May 12, 2006: Initial release
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux)
iQEVAwUBRGT7JH0pj593lg50AQI2Uwf/U3zGDrR8UkWK4ry6AYMS7HPMdbiF6Vmo 9gP9Luc6Kj8zzxCWhnNKNzEq2P0B1oD03WcPFaIPnwvQJGApeUDRimyhQj8RDjME yAUt/reWG7RZ0Z2w/qaiZP7pQ7SjyIUKkN2OCG8LMmGKqsiCdFXoss/Bu0yFMH11 uvgwibfvkOdRLAPmRTVWk+gJEAdw3xFySm9r92qmig6CxKi7GAIpi9Gf7MXcRsKg oG3y5f06Kiq8ACYszPKneHE7WNvLP1ewuaWmf7PHiNebAB+W5hfwA2yEh6e6PSV2 eBi5cpigfXBrsjXk4L7wYrD8UcRl7nN8iqzWpMwYJkSloUmcYL1BBg== =LsFu -----END PGP SIGNATURE----- . ______________
McAfee, Inc. McAfee Avert\x99 Labs Security Advisory Public Release Date: 2006-05-11
Apple QuickDraw/QuickTime Multiple Vulnerabilities
CVE-2006-1249, CVE-2006-1453, CVE-2006-1454, CVE-2006-1459, CVE-2006-1460, CVE-2006-1461, CVE-2006-1462, CVE-2006-1464, CVE-2006-1465
- Synopsis
Apple QuickTime and Apple QuickDraw are multimedia technologies used to process image, audio and video data.
Two code execution vulnerabilities are present in QuickDraw PICT image format support.
Twenty one code execution vulnerabilities are present in QuickTime support for various multimedia formats including: MOV, H.264, MPEG 4, AVI, FPX and SWF. In order for an attack to succeed user interaction is required and therefore the risk factor for these issues is medium.
CVE-2006-1459
Seven integer overflow vulnerabilities are present in QuickTime MOV video format support.
CVE-2006-1460
Five buffer overflow vulnerabilities are present in QuickTime MOV video format support.
CVE-2006-1462
Three integer overflow vulnerabilities are presenting QuickTime H.264 (M4V) video format support.
CVE-2006-1464
One buffer overflow vulnerability is present in QuickTime MPEG4 (M4P) video format support.
CVE-2006-1465
One buffer overflow vulnerability is present in QuickTime AVI video format support.
- Legal Notice
Copyright (C) 2006 McAfee, Inc. The information contained within this advisory is provided for the convenience of McAfee\x92s customers, and may be redistributed provided that no fee is charged for distribution and that the advisory is not modified in any way. McAfee makes no representations or warranties regarding the accuracy of the information referenced in this document, or the suitability of that information for your purposes.
McAfee, Inc. and/or its affiliated companies in the United States and/or other Countries. All other registered and unregistered trademarks in this document are the sole property of their respective owners.
.
1) An integer overflow error within the processing of JPEG images can be exploited via a specially crafted JPEG image to crash the application and potentially execute arbitrary code.
4) An integer overflow and boundary error within the processing of H.264 movies can be exploited via a specially crafted H.264 movie to crash the application and potentially execute arbitrary code.
5) A boundary error within the processing of MPEG4 movies can be exploited via a specially crafted MPEG4 movie to crash the application and potentially execute arbitrary code.
6) An integer overflow error within the processing of FlashPix images (".fpx") can be exploited via a specially crafted FlashPix image with an overly large value in the field specifying the number of data blocks in the file.
7) A boundary error within the processing of AVI movies can be exploited via a specially crafted AVI movie to crash the application and potentially execute arbitrary code.
8) Two boundary errors within the processing of PICT images can be exploited to either cause a stack-based via a PICT image with specially crafted font information or a heap-based buffer overflow via a PICT image with specially crafted image data. This can be exploited to crash the application and potentially execute arbitrary code.
9) A boundary error within the processing of BMP images can be exploited via a specially crafted BMP image to crash the application and potentially execute arbitrary code.
SOLUTION: Update to version 7.1. http://www.apple.com/support/downloads/quicktime71.html
PROVIDED AND/OR DISCOVERED BY: 1) Reported by the vendor. 2) Mike Price of McAfee AVERT Labs and Sowhat of Nevis Labs. 3) Mike Price, McAfee AVERT Labs. 4) Mike Price of McAfee AVERT Labs and ATmaCA. 5) Mike Price, McAfee AVERT Labs. 6) Fang Xing of eEye Digital Security and Mike Price of McAfee AVERT Labs. 7) Mike Price, McAfee AVERT Labs. 8) Mike Price, McAfee AVERT Labs. 9) Tom Ferris
ORIGINAL ADVISORY: Apple: http://docs.info.apple.com/article.html?artnum=303752
eEye Digital Security: http://www.eeye.com/html/research/advisories/AD20060511.html
Zero Day Initiative: http://www.zerodayinitiative.com/advisories/ZDI-06-015.html
Sowhat: http://secway.org/advisory/AD20060512.txt
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200605-0220", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "quicktime", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "7.0.3" }, { "model": "quicktime", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "7.0.2" }, { "model": "quicktime", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "7.0.1" }, { "model": "quicktime", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "7.0" }, { "model": "quicktime", "scope": "lte", "trust": 1.0, "vendor": "apple", "version": "7.0.4" }, { "model": "quicktime", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "7.0.4" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.0.4" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.0.3" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.0.2" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.0.1" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.0" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "6.5.2" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "6.5.1" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "6.5" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "6.1" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "6" }, { "model": "quicktime player", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "7.1" } ], "sources": [ { "db": "BID", "id": "17953" }, { "db": "CNNVD", "id": "CNNVD-200605-230" }, { "db": "NVD", "id": "CVE-2006-1461" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Mike Price ATmaCA atmaca@atmacasoft.com http://www.zerodayinitiative.com/ Sowhat smaillist@gmail.com", "sources": [ { "db": "CNNVD", "id": "CNNVD-200605-230" } ], "trust": 0.6 }, "cve": "CVE-2006-1461", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 4.9, "id": "CVE-2006-1461", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 4.9, "id": "VHN-17569", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:H/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2006-1461", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-200605-230", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-17569", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-17569" }, { "db": "CNNVD", "id": "CNNVD-200605-230" }, { "db": "NVD", "id": "CVE-2006-1461" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple buffer overflows in Apple QuickTime before 7.1 allow remote attackers to execute arbitrary code via a crafted QuickTime Flash (SWF) file. Multiple integer-overflow and buffer-overflow vulnerabilities affect QuickTime. These issues affect both Mac OS X and Microsoft Windows releases of the software. \nSuccessful exploits will result in the execution of arbitrary code in the context of the currently logged-in user. Failed exploit attempts will likely cause denial-of-service conditions. Apple QuickTime is a popular multimedia player that supports a wide variety of media formats. An attacker\n could exploit these vulnerabilities by convincing a user to access\n a specially crafted image or media file with a vulnerable version\n of QuickTime. Since QuickTime configures most web browsers to\n handle QuickTime media files, an attacker could exploit these\n vulnerabilities using a web page. \n\n For more information, please refer to the Vulnerability Notes. \n\n\nII. For further information,\n please see the Vulnerability Notes. \n\n\nIII. \n\nDisable QuickTime in your web browser\n\n An attacker may be able to exploit this vulnerability by persuading\n a user to access a specially crafted file with a web\n browser. Disabling QuickTime in your web browser will defend\n against this attack vector. For more information, refer to the\n Securing Your Web Browser document. \n\n\nAppendix A. Please send\n email to \u003ccert@cert.org\u003e with \"TA06-132B Feedback VU#289705\" in the\n subject. \n ____________________________________________________________________\n\n For instructions on subscribing to or unsubscribing from this\n mailing list, visit \u003chttp://www.us-cert.gov/cas/signup.html\u003e. \n ____________________________________________________________________\n\n Produced 2006 by US-CERT, a government organization. \n\n Terms of use:\n\n \u003chttp://www.us-cert.gov/legal.html\u003e\n ____________________________________________________________________\n\n\nRevision History\n\n May 12, 2006: Initial release\n\n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.2.1 (GNU/Linux)\n\niQEVAwUBRGT7JH0pj593lg50AQI2Uwf/U3zGDrR8UkWK4ry6AYMS7HPMdbiF6Vmo\n9gP9Luc6Kj8zzxCWhnNKNzEq2P0B1oD03WcPFaIPnwvQJGApeUDRimyhQj8RDjME\nyAUt/reWG7RZ0Z2w/qaiZP7pQ7SjyIUKkN2OCG8LMmGKqsiCdFXoss/Bu0yFMH11\nuvgwibfvkOdRLAPmRTVWk+gJEAdw3xFySm9r92qmig6CxKi7GAIpi9Gf7MXcRsKg\noG3y5f06Kiq8ACYszPKneHE7WNvLP1ewuaWmf7PHiNebAB+W5hfwA2yEh6e6PSV2\neBi5cpigfXBrsjXk4L7wYrD8UcRl7nN8iqzWpMwYJkSloUmcYL1BBg==\n=LsFu\n-----END PGP SIGNATURE-----\n. ____________________________________________________________________\n\nMcAfee, Inc. \nMcAfee Avert\\x99 Labs Security Advisory\nPublic Release Date: 2006-05-11\n\nApple QuickDraw/QuickTime Multiple Vulnerabilities\n\nCVE-2006-1249, CVE-2006-1453, CVE-2006-1454, CVE-2006-1459, CVE-2006-1460, CVE-2006-1461, CVE-2006-1462, CVE-2006-1464, CVE-2006-1465\n______________________________________________________________________\n\n* Synopsis\n\nApple QuickTime and Apple QuickDraw are multimedia technologies used to process image, audio and video data. \n\nTwo code execution vulnerabilities are present in QuickDraw PICT image format support. \n\nTwenty one code execution vulnerabilities are present in QuickTime support for various multimedia formats including: MOV, H.264, MPEG 4, AVI, FPX and SWF. In order for an attack to succeed user interaction is required and therefore the risk factor for these issues is medium. \n\nCVE-2006-1459\n\nSeven integer overflow vulnerabilities are present in QuickTime MOV video format support. \n\nCVE-2006-1460\n\nFive buffer overflow vulnerabilities are present in QuickTime MOV video format support. \n\nCVE-2006-1462\n\nThree integer overflow vulnerabilities are presenting QuickTime H.264 (M4V) video format support. \n\nCVE-2006-1464\n\nOne buffer overflow vulnerability is present in QuickTime MPEG4 (M4P) video format support. \n\nCVE-2006-1465\n\nOne buffer overflow vulnerability is present in QuickTime AVI video format support. \n\n______________________________________________________________________\n\n* Legal Notice\n\nCopyright (C) 2006 McAfee, Inc. \nThe information contained within this advisory is provided for the convenience of McAfee\\x92s customers, and may be redistributed provided that no fee is charged for distribution and that the advisory is not modified in any way. McAfee makes no representations or warranties regarding the accuracy of the information referenced in this document, or the suitability of that information for your purposes. \n\nMcAfee, Inc. and/or its affiliated companies in the United States and/or other Countries. All other registered and unregistered trademarks in this document are the sole property of their respective owners. \n\n______________________________________________________________________\n. \n\n1) An integer overflow error within the processing of JPEG images can\nbe exploited via a specially crafted JPEG image to crash the\napplication and potentially execute arbitrary code. \n\n4) An integer overflow and boundary error within the processing of\nH.264 movies can be exploited via a specially crafted H.264 movie to\ncrash the application and potentially execute arbitrary code. \n\n5) A boundary error within the processing of MPEG4 movies can be\nexploited via a specially crafted MPEG4 movie to crash the\napplication and potentially execute arbitrary code. \n\n6) An integer overflow error within the processing of FlashPix images\n(\".fpx\") can be exploited via a specially crafted FlashPix image with\nan overly large value in the field specifying the number of data\nblocks in the file. \n\n7) A boundary error within the processing of AVI movies can be\nexploited via a specially crafted AVI movie to crash the application\nand potentially execute arbitrary code. \n\n8) Two boundary errors within the processing of PICT images can be\nexploited to either cause a stack-based via a PICT image with\nspecially crafted font information or a heap-based buffer overflow\nvia a PICT image with specially crafted image data. This can be\nexploited to crash the application and potentially execute arbitrary\ncode. \n\n9) A boundary error within the processing of BMP images can be\nexploited via a specially crafted BMP image to crash the application\nand potentially execute arbitrary code. \n\nSOLUTION:\nUpdate to version 7.1. \nhttp://www.apple.com/support/downloads/quicktime71.html\n\nPROVIDED AND/OR DISCOVERED BY:\n1) Reported by the vendor. \n2) Mike Price of McAfee AVERT Labs and Sowhat of Nevis Labs. \n3) Mike Price, McAfee AVERT Labs. \n4) Mike Price of McAfee AVERT Labs and ATmaCA. \n5) Mike Price, McAfee AVERT Labs. \n6) Fang Xing of eEye Digital Security and Mike Price of McAfee AVERT\nLabs. \n7) Mike Price, McAfee AVERT Labs. \n8) Mike Price, McAfee AVERT Labs. \n9) Tom Ferris\n\nORIGINAL ADVISORY:\nApple:\nhttp://docs.info.apple.com/article.html?artnum=303752\n\neEye Digital Security:\nhttp://www.eeye.com/html/research/advisories/AD20060511.html\n\nZero Day Initiative:\nhttp://www.zerodayinitiative.com/advisories/ZDI-06-015.html\n\nSowhat:\nhttp://secway.org/advisory/AD20060512.txt\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2006-1461" }, { "db": "BID", "id": "17953" }, { "db": "VULHUB", "id": "VHN-17569" }, { "db": "PACKETSTORM", "id": "46427" }, { "db": "PACKETSTORM", "id": "46419" }, { "db": "PACKETSTORM", "id": "46260" } ], "trust": 1.53 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2006-1461", "trust": 2.1 }, { "db": "BID", "id": "17953", "trust": 2.0 }, { "db": "SECUNIA", "id": "20069", "trust": 1.9 }, { "db": "USCERT", "id": "TA06-132B", "trust": 1.8 }, { "db": "SREASON", "id": "887", "trust": 1.7 }, { "db": "SECTRACK", "id": "1016067", "trust": 1.7 }, { "db": "VUPEN", "id": "ADV-2006-1778", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-200605-230", "trust": 0.7 }, { "db": "XF", "id": "26394", "trust": 0.6 }, { "db": "APPLE", "id": "APPLE-SA-2006-05-11", "trust": 0.6 }, { "db": "CERT/CC", "id": "TA06-132B", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "20060512 APPLE QUICKDRAW/QUICKTIME MULTIPLE VULNERABILITIES", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-17569", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "46427", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "46419", "trust": 0.1 }, { "db": "ZDI", "id": "ZDI-06-015", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "46260", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-17569" }, { "db": "BID", "id": "17953" }, { "db": "PACKETSTORM", "id": "46427" }, { "db": "PACKETSTORM", "id": "46419" }, { "db": "PACKETSTORM", "id": "46260" }, { "db": "CNNVD", "id": "CNNVD-200605-230" }, { "db": "NVD", "id": "CVE-2006-1461" } ] }, "id": "VAR-200605-0220", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-17569" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T19:51:11.488000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-17569" }, { "db": "NVD", "id": "CVE-2006-1461" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://lists.apple.com/archives/security-announce/2006/may/msg00002.html" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/17953" }, { "trust": 1.7, "url": "http://www.us-cert.gov/cas/techalerts/ta06-132b.html" }, { "trust": 1.7, "url": "http://securitytracker.com/id?1016067" }, { "trust": 1.7, "url": "http://secunia.com/advisories/20069" }, { "trust": 1.7, "url": "http://securityreason.com/securityalert/887" }, { "trust": 1.1, "url": "http://www.securityfocus.com/archive/1/433831/100/0/threaded" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2006/1778" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26394" }, { "trust": 0.6, "url": "http://www.securityfocus.com/archive/1/archive/1/433831/100/0/threaded" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2006/1778" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/26394" }, { "trust": 0.4, "url": "http://docs.info.apple.com/article.html?artnum=303752" }, { "trust": 0.3, "url": "http://www.apple.com/quicktime/" }, { "trust": 0.3, "url": "/archive/1/433850" }, { "trust": 0.3, "url": "/archive/1/433810" }, { "trust": 0.3, "url": "/archive/1/433828" }, { "trust": 0.1, "url": "http://www.apple.com/quicktime/download/standalone.html\u003e" }, { "trust": 0.1, "url": "http://www.kb.cert.org/vuls/byid?searchview\u0026query=quicktime_7.1\u003e" }, { "trust": 0.1, "url": "http://docs.info.apple.com/article.html?artnum=303752\u003e" }, { "trust": 0.1, "url": "http://www.us-cert.gov/cas/techalerts/ta06-132b.html\u003e" }, { "trust": 0.1, "url": "http://www.us-cert.gov/legal.html\u003e" }, { "trust": 0.1, "url": "http://docs.info.apple.com/article.html?artnum=106704\u003e" }, { "trust": 0.1, "url": "http://www.us-cert.gov/cas/signup.html\u003e." }, { "trust": 0.1, "url": "http://www.apple.com/support/downloads/quicktime71.html\u003e" }, { "trust": 0.1, "url": "http://www.us-cert.gov/reading_room/securing_browser/\u003e" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-1461" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-1464" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-1453" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-1462" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-1454" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-1465" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-1459" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-1460" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-1249" }, { "trust": 0.1, "url": "http://www.apple.com/support/downloads/quicktime71.html" }, { "trust": 0.1, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/product/5090/" }, { "trust": 0.1, "url": "http://www.zerodayinitiative.com/advisories/zdi-06-015.html" }, { "trust": 0.1, "url": "http://secway.org/advisory/ad20060512.txt" }, { "trust": 0.1, "url": "http://secunia.com/product/810/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/20069/" }, { "trust": 0.1, "url": "http://www.eeye.com/html/research/advisories/ad20060511.html" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/product/7923/" }, { "trust": 0.1, "url": "http://secunia.com/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/product/215/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-17569" }, { "db": "BID", "id": "17953" }, { "db": "PACKETSTORM", "id": "46427" }, { "db": "PACKETSTORM", "id": "46419" }, { "db": "PACKETSTORM", "id": "46260" }, { "db": "CNNVD", "id": "CNNVD-200605-230" }, { "db": "NVD", "id": "CVE-2006-1461" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-17569" }, { "db": "BID", "id": "17953" }, { "db": "PACKETSTORM", "id": "46427" }, { "db": "PACKETSTORM", "id": "46419" }, { "db": "PACKETSTORM", "id": "46260" }, { "db": "CNNVD", "id": "CNNVD-200605-230" }, { "db": "NVD", "id": "CVE-2006-1461" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2006-05-12T00:00:00", "db": "VULHUB", "id": "VHN-17569" }, { "date": "2006-05-11T00:00:00", "db": "BID", "id": "17953" }, { "date": "2006-05-22T00:50:08", "db": "PACKETSTORM", "id": "46427" }, { "date": "2006-05-21T22:28:33", "db": "PACKETSTORM", "id": "46419" }, { "date": "2006-05-17T05:39:52", "db": "PACKETSTORM", "id": "46260" }, { "date": "2005-11-07T00:00:00", "db": "CNNVD", "id": "CNNVD-200605-230" }, { "date": "2006-05-12T20:06:00", "db": "NVD", "id": "CVE-2006-1461" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-10-18T00:00:00", "db": "VULHUB", "id": "VHN-17569" }, { "date": "2006-05-15T22:29:00", "db": "BID", "id": "17953" }, { "date": "2006-05-25T00:00:00", "db": "CNNVD", "id": "CNNVD-200605-230" }, { "date": "2024-11-21T00:08:55.677000", "db": "NVD", "id": "CVE-2006-1461" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "46427" }, { "db": "CNNVD", "id": "CNNVD-200605-230" } ], "trust": 0.7 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Apple QuickTime Flash the film Multiple buffer overflow vulnerabilities", "sources": [ { "db": "CNNVD", "id": "CNNVD-200605-230" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer overflow", "sources": [ { "db": "CNNVD", "id": "CNNVD-200605-230" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.