Integer overflow in the AAC file parsing code in Apple iTunes before 6.0.5 on Mac OS X 10.2.8 or later, and Windows XP and 2000, allows remote user-assisted attackers to execute arbitrary code via an AAC (M4P, M4A, or M4B) file with a sample table size (STSZ) atom with a "malformed" sample_size_table value.
References
Configurations
History
21 Nov 2024, 00:08
Type | Values Removed | Values Added |
---|---|---|
References | () http://docs.info.apple.com/article.html?artnum=303952 - Patch | |
References | () http://secunia.com/advisories/20891 - Patch, Vendor Advisory | |
References | () http://securitytracker.com/id?1016413 - | |
References | () http://www.kb.cert.org/vuls/id/907836 - Patch, US Government Resource | |
References | () http://www.securityfocus.com/archive/1/438812/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/18730 - | |
References | () http://www.vupen.com/english/advisories/2006/2601 - Vendor Advisory | |
References | () http://www.zerodayinitiative.com/advisories/ZDI-06-020.html - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/27481 - |
Information
Published : 2006-06-29 23:05
Updated : 2024-11-21 00:08
NVD link : CVE-2006-1467
Mitre link : CVE-2006-1467
CVE.ORG link : CVE-2006-1467
JSON object : View
Products Affected
apple
- itunes
CWE
CWE-189
Numeric Errors