CVSS2
Attack Vector
NETWORK
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:H/Au:N/C:P/I:P/A:P
EPSS
Percentile
95.1%
A buffer overflow vulnerability in the way Apple QuickTime handles FlashPix files could allow a remote attacker to execute arbitrary code or cause a denial-of-service condition.
A buffer overflow vulnerability in QuickTime for Windows and Mac OS X may allow an attacker to execute arbitrary code with the privileges of the user running QuickTime. By convincing a user to open a specially-crafted FlashPix file, an attacker can trigger the overflow.
Depending on settings, a web browser could automatically open a FlashPix file with QuickTime. Apple iTunes includes QuickTime.
A remote, unauthenticated attacker can execute arbitrary code or create a denial-of-service condition.
Upgrade
Apple has addressed this issue in Quicktime 7.1.3. The latest version of QuickTime is available from the QuickTime download site.
Do not open multimedia files from untrusted sources
Do not open multimedia files that are from untrusted or unknown sources. For more information, please see Using Caution with Email Attachments.
Limit privileges
Running QuickTime with reduced privileges may help mitigate the effects of this vulnerability. Users with administrator access can run QuickTime with reduced privileges by following the instructions in Microsoft knowledgebase article 294676.
Run QuickTime with their regular user accounts. See the Before You Connect a New Computer to the Internet for more details.
200316
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Updated: September 13, 2006
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Please see the Apple Quicktime 7.1.3 Update article 304357.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23200316 Feedback>).
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
Thanks to Apple Product Security for information about this vulnerability. Apple credits Mike Price of McAfee AVERT Labs.
This document was written by Ryan Giobbi.
CVE IDs: | CVE-2006-4388 |
---|---|
Severity Metric: | 0.08 Date Public: |