CVE-2006-4384

Heap-based buffer overflow in Apple QuickTime before 7.1.3 allows user-assisted remote attackers to execute arbitrary code via the COLOR_64 chunk in a FLIC (FLC) movie.
References
Link Resource
http://docs.info.apple.com/article.html?artnum=304357
http://lists.apple.com/archives/Security-announce/2006/Sep/msg00000.html Patch
http://secunia.com/advisories/21893
http://secunia.com/advisories/29182
http://security.gentoo.org/glsa/glsa-200803-08.xml
http://securityreason.com/securityalert/1554
http://securitytracker.com/id?1016830
http://www.idefense.com/intelligence/vulnerabilities/display.php?id=413 Patch Vendor Advisory
http://www.kb.cert.org/vuls/id/489836 US Government Resource
http://www.osvdb.org/28771
http://www.reversemode.com/index.php?option=com_remository&Itemid=2&func=fileinfo&id=24
http://www.reversemode.com/index.php?option=com_remository&Itemid=2&func=fileinfo&id=25
http://www.securityfocus.com/archive/1/445888/100/0/threaded
http://www.securityfocus.com/archive/1/446134/100/0/threaded
http://www.securityfocus.com/bid/19976 Exploit Patch
http://www.vupen.com/english/advisories/2006/3577
https://exchange.xforce.ibmcloud.com/vulnerabilities/28930
http://docs.info.apple.com/article.html?artnum=304357
http://lists.apple.com/archives/Security-announce/2006/Sep/msg00000.html Patch
http://secunia.com/advisories/21893
http://secunia.com/advisories/29182
http://security.gentoo.org/glsa/glsa-200803-08.xml
http://securityreason.com/securityalert/1554
http://securitytracker.com/id?1016830
http://www.idefense.com/intelligence/vulnerabilities/display.php?id=413 Patch Vendor Advisory
http://www.kb.cert.org/vuls/id/489836 US Government Resource
http://www.osvdb.org/28771
http://www.reversemode.com/index.php?option=com_remository&Itemid=2&func=fileinfo&id=24
http://www.reversemode.com/index.php?option=com_remository&Itemid=2&func=fileinfo&id=25
http://www.securityfocus.com/archive/1/445888/100/0/threaded
http://www.securityfocus.com/archive/1/446134/100/0/threaded
http://www.securityfocus.com/bid/19976 Exploit Patch
http://www.vupen.com/english/advisories/2006/3577
https://exchange.xforce.ibmcloud.com/vulnerabilities/28930
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apple:quicktime:*:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:5.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:5.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:5.0.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:6.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:6.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:6.5:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:6.5.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:6.5.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:6.5.2:*:mac_os_x_10.2:*:*:*:*:*
cpe:2.3:a:apple:quicktime:6.5.2:*:mac_os_x_10.3:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.0:*:windows:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.0.1:*:mac_os_x_10.3:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.0.1:*:mac_os_x_10.4:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.0.1:*:windows:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.0.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.0.2:*:windows:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.0.3:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.0.4:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.1.1:*:*:*:*:*:*:*

History

21 Nov 2024, 00:15

Type Values Removed Values Added
References () http://docs.info.apple.com/article.html?artnum=304357 - () http://docs.info.apple.com/article.html?artnum=304357 -
References () http://lists.apple.com/archives/Security-announce/2006/Sep/msg00000.html - Patch () http://lists.apple.com/archives/Security-announce/2006/Sep/msg00000.html - Patch
References () http://secunia.com/advisories/21893 - () http://secunia.com/advisories/21893 -
References () http://secunia.com/advisories/29182 - () http://secunia.com/advisories/29182 -
References () http://security.gentoo.org/glsa/glsa-200803-08.xml - () http://security.gentoo.org/glsa/glsa-200803-08.xml -
References () http://securityreason.com/securityalert/1554 - () http://securityreason.com/securityalert/1554 -
References () http://securitytracker.com/id?1016830 - () http://securitytracker.com/id?1016830 -
References () http://www.idefense.com/intelligence/vulnerabilities/display.php?id=413 - Patch, Vendor Advisory () http://www.idefense.com/intelligence/vulnerabilities/display.php?id=413 - Patch, Vendor Advisory
References () http://www.kb.cert.org/vuls/id/489836 - US Government Resource () http://www.kb.cert.org/vuls/id/489836 - US Government Resource
References () http://www.osvdb.org/28771 - () http://www.osvdb.org/28771 -
References () http://www.reversemode.com/index.php?option=com_remository&Itemid=2&func=fileinfo&id=24 - () http://www.reversemode.com/index.php?option=com_remository&Itemid=2&func=fileinfo&id=24 -
References () http://www.reversemode.com/index.php?option=com_remository&Itemid=2&func=fileinfo&id=25 - () http://www.reversemode.com/index.php?option=com_remository&Itemid=2&func=fileinfo&id=25 -
References () http://www.securityfocus.com/archive/1/445888/100/0/threaded - () http://www.securityfocus.com/archive/1/445888/100/0/threaded -
References () http://www.securityfocus.com/archive/1/446134/100/0/threaded - () http://www.securityfocus.com/archive/1/446134/100/0/threaded -
References () http://www.securityfocus.com/bid/19976 - Exploit, Patch () http://www.securityfocus.com/bid/19976 - Exploit, Patch
References () http://www.vupen.com/english/advisories/2006/3577 - () http://www.vupen.com/english/advisories/2006/3577 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/28930 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/28930 -

Information

Published : 2006-09-12 23:07

Updated : 2024-11-21 00:15


NVD link : CVE-2006-4384

Mitre link : CVE-2006-4384

CVE.ORG link : CVE-2006-4384


JSON object : View

Products Affected

apple

  • quicktime