CVE-2005-2340

Heap-based buffer overflow in Apple Quicktime before 7.0.4 allows remote attackers to execute arbitrary code via a crafted (1) QuickTime Image File (QTIF), (2) PICT, or (3) JPEG format image with a long data field.
References
Link Resource
http://archives.neohapsis.com/archives/fulldisclosure/2006-01/0392.html
http://archives.neohapsis.com/archives/fulldisclosure/2006-01/0398.html Vendor Advisory
http://archives.neohapsis.com/archives/fulldisclosure/2006-01/0402.html
http://docs.info.apple.com/article.html?artnum=303101 Patch
http://secunia.com/advisories/18370 Patch Vendor Advisory
http://securityreason.com/securityalert/332
http://securitytracker.com/id?1015463 Patch
http://www.cirt.dk/advisories/cirt-41-advisory.pdf Vendor Advisory
http://www.kb.cert.org/vuls/id/629845 Patch Third Party Advisory US Government Resource
http://www.kb.cert.org/vuls/id/687201 Patch Third Party Advisory US Government Resource
http://www.osvdb.org/22333 Patch
http://www.osvdb.org/22334 Patch
http://www.osvdb.org/22335 Patch
http://www.securityfocus.com/archive/1/421547/100/0/threaded
http://www.securityfocus.com/archive/1/421566/100/0/threaded
http://www.securityfocus.com/bid/16202 Patch
http://www.securityfocus.com/bid/16212 Exploit
http://www.us-cert.gov/cas/techalerts/TA06-011A.html Patch Third Party Advisory US Government Resource
http://www.vupen.com/english/advisories/2006/0128 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/24054
http://archives.neohapsis.com/archives/fulldisclosure/2006-01/0392.html
http://archives.neohapsis.com/archives/fulldisclosure/2006-01/0398.html Vendor Advisory
http://archives.neohapsis.com/archives/fulldisclosure/2006-01/0402.html
http://docs.info.apple.com/article.html?artnum=303101 Patch
http://secunia.com/advisories/18370 Patch Vendor Advisory
http://securityreason.com/securityalert/332
http://securitytracker.com/id?1015463 Patch
http://www.cirt.dk/advisories/cirt-41-advisory.pdf Vendor Advisory
http://www.kb.cert.org/vuls/id/629845 Patch Third Party Advisory US Government Resource
http://www.kb.cert.org/vuls/id/687201 Patch Third Party Advisory US Government Resource
http://www.osvdb.org/22333 Patch
http://www.osvdb.org/22334 Patch
http://www.osvdb.org/22335 Patch
http://www.securityfocus.com/archive/1/421547/100/0/threaded
http://www.securityfocus.com/archive/1/421566/100/0/threaded
http://www.securityfocus.com/bid/16202 Patch
http://www.securityfocus.com/bid/16212 Exploit
http://www.us-cert.gov/cas/techalerts/TA06-011A.html Patch Third Party Advisory US Government Resource
http://www.vupen.com/english/advisories/2006/0128 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/24054
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apple:quicktime:*:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.0.2:*:*:*:*:*:*:*

History

20 Nov 2024, 23:59

Type Values Removed Values Added
References () http://archives.neohapsis.com/archives/fulldisclosure/2006-01/0392.html - () http://archives.neohapsis.com/archives/fulldisclosure/2006-01/0392.html -
References () http://archives.neohapsis.com/archives/fulldisclosure/2006-01/0398.html - Vendor Advisory () http://archives.neohapsis.com/archives/fulldisclosure/2006-01/0398.html - Vendor Advisory
References () http://archives.neohapsis.com/archives/fulldisclosure/2006-01/0402.html - () http://archives.neohapsis.com/archives/fulldisclosure/2006-01/0402.html -
References () http://docs.info.apple.com/article.html?artnum=303101 - Patch () http://docs.info.apple.com/article.html?artnum=303101 - Patch
References () http://secunia.com/advisories/18370 - Patch, Vendor Advisory () http://secunia.com/advisories/18370 - Patch, Vendor Advisory
References () http://securityreason.com/securityalert/332 - () http://securityreason.com/securityalert/332 -
References () http://securitytracker.com/id?1015463 - Patch () http://securitytracker.com/id?1015463 - Patch
References () http://www.cirt.dk/advisories/cirt-41-advisory.pdf - Vendor Advisory () http://www.cirt.dk/advisories/cirt-41-advisory.pdf - Vendor Advisory
References () http://www.kb.cert.org/vuls/id/629845 - Patch, Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/629845 - Patch, Third Party Advisory, US Government Resource
References () http://www.kb.cert.org/vuls/id/687201 - Patch, Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/687201 - Patch, Third Party Advisory, US Government Resource
References () http://www.osvdb.org/22333 - Patch () http://www.osvdb.org/22333 - Patch
References () http://www.osvdb.org/22334 - Patch () http://www.osvdb.org/22334 - Patch
References () http://www.osvdb.org/22335 - Patch () http://www.osvdb.org/22335 - Patch
References () http://www.securityfocus.com/archive/1/421547/100/0/threaded - () http://www.securityfocus.com/archive/1/421547/100/0/threaded -
References () http://www.securityfocus.com/archive/1/421566/100/0/threaded - () http://www.securityfocus.com/archive/1/421566/100/0/threaded -
References () http://www.securityfocus.com/bid/16202 - Patch () http://www.securityfocus.com/bid/16202 - Patch
References () http://www.securityfocus.com/bid/16212 - Exploit () http://www.securityfocus.com/bid/16212 - Exploit
References () http://www.us-cert.gov/cas/techalerts/TA06-011A.html - Patch, Third Party Advisory, US Government Resource () http://www.us-cert.gov/cas/techalerts/TA06-011A.html - Patch, Third Party Advisory, US Government Resource
References () http://www.vupen.com/english/advisories/2006/0128 - Vendor Advisory () http://www.vupen.com/english/advisories/2006/0128 - Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/24054 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/24054 -

Information

Published : 2005-12-31 05:00

Updated : 2024-11-20 23:59


NVD link : CVE-2005-2340

Mitre link : CVE-2005-2340

CVE.ORG link : CVE-2005-2340


JSON object : View

Products Affected

apple

  • quicktime
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer