VAR-200407-0077
Vulnerability from variot - Updated: 2024-06-09 23:13Integer overflow in Apple QuickTime (QuickTime.qts) before 6.5.1 allows attackers to execute arbitrary code via a large "number of entries" field in the sample-to-chunk table data for a .mov movie file, which leads to a heap-based buffer overflow. apple's QuickTime Exists in unspecified vulnerabilities.None. This issue can be triggered by a malformed .mov file and is reported to be exploitable to execute arbitrary code on Microsoft Windows platforms. This issue could also cause the player to crash on other platforms. Conflicting information has been released by the vendor that suggests that this issue will only result in a denial of service on Mac OS X. Apple QuickTime (QuickTime.qts) Heap Overflow
Release Date: May 02, 2004
Date Reported: February 18, 2004
Severity: High (Code Execution)
Vendor: Apple
Systems Affected: Apple QuickTime 6.5 Apple iTunes 4.2.0.72
Description: The Apple QuickTime media player is used for playing, interacting with or viewing video, audio, VR or graphics files. Many popular web browsers, media players, and other applications use their libraries to play various QuickTime movie formats through their applications. The vulnerability allows a remote attacker to reliably overwrite heap memory with user-controlled data and execute arbitrary code within the SYSTEM context.
This specific flaw exists within the QuickTime.qts file which many applications access QuickTime's functionality through. By specially crafting atoms within a movie file, a direct heap overwrite is triggered, and reliable code execution is then possible.
Technical Details: The code in QuickTime.qts responsible for copying Sample-to-Chunk table entries from the 'stsc' atom data in a QuickTime-format movie into an array allocated on the heap. According to developer.apple.com, the format of the Sample-to-Chunk atom is as follows:
Offset Type Description
0000h DWORD atom size 0004h DWORD atom type tag ('stsc') 0008h BYTE version 0009h BYTE[3] flags 000Ch DWORD number of entries 0010h ... sample-to-chunk table data
The heap block intended to hold the sample-to-chunk table data is allocated with a size equal to (number_of_entries + 2) * 16. By supplying the "number of entries" field with the value 0x0FFFFFFE or greater, an absolutely classic integer overflow results that causes an insufficiently-sized heap block to be allocated, resulting in an equally classic complete heap memory overwrite.
It is difficult to express just how textbook this vulnerability scenario really is. Successful exploitation of the vulnerability is self-evident, and therefore no further discussion is warranted. It is our sincere hope that the vendor will make an earnest effort to increase the maturity of its security response capabilities, so that researchers will be encouraged to continue to work with them amicably on future security issues. Apple is doing a disservice to its customers by incorrectly labeling this vulnerability as a "crash bug" rather than stating correctly that attackers can compromise systems running the affected Apple software.
References: QuickTime: QuickTime File Format http://developer.apple.com/documentation/QuickTime/QTFF/index.html
Vendor Status: Apple has released a patch for this vulnerability. The patch is available via the Updates section of the affected applications.
This vulnerability has been assigned the CVE identifier CAN-2004-0431.
Credit: Karl Lynn
Additional Research: Derek Soeder
Greetings: Riley Hassell, Fuzen, Cubby, the ladies in the band MudBath, Zoe bird, Michelle L., and of course the entire staff at eEye.
Copyright (c) 1998-2004 eEye Digital Security Permission is hereby granted for the redistribution of this alert electronically. It is not to be edited in any way without express consent of eEye. If you wish to reprint the whole or any part of this alert in any other medium excluding electronic medium, please email alert@eEye.com for permission.
Disclaimer The information within this paper may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties with regard to this information. In no event shall the author be liable for any damages whatsoever arising out of or in connection with the use or spread of this information. Any use of this information is at the user's own risk.
Feedback Please send suggestions, updates, and comments to:
eEye Digital Security http://www.eEye.com info@eEye.com
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-200407-0077",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "quicktime",
"scope": "lte",
"trust": 1.0,
"vendor": "apple",
"version": "6.5"
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "apple computer",
"version": null
},
{
"model": "quicktime",
"scope": "eq",
"trust": 0.8,
"vendor": "\u30a2\u30c3\u30d7\u30eb",
"version": null
},
{
"model": "quicktime",
"scope": "lte",
"trust": 0.8,
"vendor": "\u30a2\u30c3\u30d7\u30eb",
"version": "6.5 and earlier"
},
{
"model": "quicktime",
"scope": "eq",
"trust": 0.6,
"vendor": "apple",
"version": "6.5"
},
{
"model": "quicktime player",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "6.5"
},
{
"model": "quicktime player",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "6.1"
},
{
"model": "quicktime player",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "5.0.2"
},
{
"model": "quicktime player",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "6"
},
{
"model": "itunes",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "4.2.72"
},
{
"model": "quicktime player",
"scope": "ne",
"trust": 0.3,
"vendor": "apple",
"version": "6.5.1"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#782958"
},
{
"db": "BID",
"id": "10257"
},
{
"db": "JVNDB",
"id": "JVNDB-2004-000934"
},
{
"db": "CNNVD",
"id": "CNNVD-200407-012"
},
{
"db": "NVD",
"id": "CVE-2004-0431"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:apple:quicktime:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "6.5",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2004-0431"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Eeye Digital Security",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200407-012"
}
],
"trust": 0.6
},
"cve": "CVE-2004-0431",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 4.9,
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": true,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": true,
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "High",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 5.1,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "CVE-2004-0431",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 4.9,
"id": "VHN-8861",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:H/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2004-0431",
"trust": 1.8,
"value": "MEDIUM"
},
{
"author": "CARNEGIE MELLON",
"id": "VU#782958",
"trust": 0.8,
"value": "27.00"
},
{
"author": "CNNVD",
"id": "CNNVD-200407-012",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-8861",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#782958"
},
{
"db": "VULHUB",
"id": "VHN-8861"
},
{
"db": "JVNDB",
"id": "JVNDB-2004-000934"
},
{
"db": "CNNVD",
"id": "CNNVD-200407-012"
},
{
"db": "NVD",
"id": "CVE-2004-0431"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Integer overflow in Apple QuickTime (QuickTime.qts) before 6.5.1 allows attackers to execute arbitrary code via a large \"number of entries\" field in the sample-to-chunk table data for a .mov movie file, which leads to a heap-based buffer overflow. apple\u0027s QuickTime Exists in unspecified vulnerabilities.None. \nThis issue can be triggered by a malformed .mov file and is reported to be exploitable to execute arbitrary code on Microsoft Windows platforms. This issue could also cause the player to crash on other platforms. Conflicting information has been released by the vendor that suggests that this issue will only result in a denial of service on Mac OS X. Apple QuickTime (QuickTime.qts) Heap Overflow\n\nRelease Date:\nMay 02, 2004\n\nDate Reported:\nFebruary 18, 2004\n\nSeverity:\nHigh (Code Execution)\n\nVendor:\nApple\n\nSystems Affected:\nApple QuickTime 6.5\nApple iTunes 4.2.0.72\n\nDescription:\nThe Apple QuickTime media player is used for playing, interacting with\nor viewing video, audio, VR or graphics files. Many popular web\nbrowsers, media players, and other applications use their libraries to\nplay various QuickTime movie formats through their applications. The vulnerability allows a remote attacker to reliably\noverwrite heap memory with user-controlled data and execute arbitrary\ncode within the SYSTEM context. \n\nThis specific flaw exists within the QuickTime.qts file which many\napplications access QuickTime\u0027s functionality through. By specially\ncrafting atoms within a movie file, a direct heap overwrite is\ntriggered, and reliable code execution is then possible. \n\nTechnical Details:\nThe code in QuickTime.qts responsible for copying Sample-to-Chunk table\nentries from the \u0027stsc\u0027 atom data in a QuickTime-format movie into an\narray allocated on the heap. According to developer.apple.com, the\nformat of the Sample-to-Chunk atom is as follows:\n\n Offset Type Description\n ------- ------- --------------------------------\n 0000h DWORD atom size\n 0004h DWORD atom type tag (\u0027stsc\u0027)\n 0008h BYTE version\n 0009h BYTE[3] flags\n 000Ch DWORD number of entries\n 0010h ... sample-to-chunk table data\n\nThe heap block intended to hold the sample-to-chunk table data is\nallocated with a size equal to (number_of_entries + 2) * 16. By\nsupplying the \"number of entries\" field with the value 0x0FFFFFFE or\ngreater, an absolutely classic integer overflow results that causes an\ninsufficiently-sized heap block to be allocated, resulting in an equally\nclassic complete heap memory overwrite. \n\nIt is difficult to express just how textbook this vulnerability scenario\nreally is. Successful exploitation of the vulnerability is\nself-evident, and therefore no further discussion is warranted. It is\nour sincere hope that the vendor will make an earnest effort to increase\nthe maturity of its security response capabilities, so that researchers\nwill be encouraged to continue to work with them amicably on future\nsecurity issues. Apple is doing a disservice to its customers by\nincorrectly labeling this vulnerability as a \"crash bug\" rather than\nstating correctly that attackers can compromise systems running the\naffected Apple software. \n\nReferences:\nQuickTime: QuickTime File Format\nhttp://developer.apple.com/documentation/QuickTime/QTFF/index.html\n\nVendor Status:\nApple has released a patch for this vulnerability. The patch is\navailable via the Updates section of the affected applications. \n\nThis vulnerability has been assigned the CVE identifier CAN-2004-0431. \n\nCredit:\nKarl Lynn\n\nAdditional Research:\nDerek Soeder\n\nGreetings:\nRiley Hassell, Fuzen, Cubby, the ladies in the band MudBath, Zoe bird,\nMichelle L., and of course the entire staff at eEye. \n\nCopyright (c) 1998-2004 eEye Digital Security Permission is hereby\ngranted for the redistribution of this alert electronically. It is not\nto be edited in any way without express consent of eEye. If you wish to\nreprint the whole or any part of this alert in any other medium\nexcluding electronic medium, please email alert@eEye.com for permission. \n\nDisclaimer\nThe information within this paper may change without notice. Use of this\ninformation constitutes acceptance for use in an AS IS condition. There\nare NO warranties with regard to this information. In no event shall the\nauthor be liable for any damages whatsoever arising out of or in\nconnection with the use or spread of this information. Any use of this\ninformation is at the user\u0027s own risk. \n\nFeedback\nPlease send suggestions, updates, and comments to:\n\neEye Digital Security\nhttp://www.eEye.com\ninfo@eEye.com\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2004-0431"
},
{
"db": "CERT/CC",
"id": "VU#782958"
},
{
"db": "JVNDB",
"id": "JVNDB-2004-000934"
},
{
"db": "BID",
"id": "10257"
},
{
"db": "VULHUB",
"id": "VHN-8861"
},
{
"db": "PACKETSTORM",
"id": "33233"
}
],
"trust": 2.79
},
"exploit_availability": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"reference": "https://www.scap.org.cn/vuln/vhn-8861",
"trust": 0.1,
"type": "unknown"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-8861"
}
]
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2004-0431",
"trust": 3.7
},
{
"db": "CERT/CC",
"id": "VU#782958",
"trust": 3.3
},
{
"db": "SECTRACK",
"id": "1010010",
"trust": 0.8
},
{
"db": "SECUNIA",
"id": "11071",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2004-000934",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-200407-012",
"trust": 0.7
},
{
"db": "XF",
"id": "16026",
"trust": 0.6
},
{
"db": "BUGTRAQ",
"id": "20040502 EEYE: APPLE QUICKTIME (QUICKTIME.QTS) HEAP OVERFLOW",
"trust": 0.6
},
{
"db": "NTBUGTRAQ",
"id": "20040502 EEYE: APPLE QUICKTIME (QUICKTIME.QTS) HEAP OVERFLOW",
"trust": 0.6
},
{
"db": "APPLE",
"id": "APPLE-SA-2004-04-30",
"trust": 0.6
},
{
"db": "BID",
"id": "10257",
"trust": 0.4
},
{
"db": "PACKETSTORM",
"id": "33233",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-8861",
"trust": 0.1
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#782958"
},
{
"db": "VULHUB",
"id": "VHN-8861"
},
{
"db": "BID",
"id": "10257"
},
{
"db": "JVNDB",
"id": "JVNDB-2004-000934"
},
{
"db": "PACKETSTORM",
"id": "33233"
},
{
"db": "CNNVD",
"id": "CNNVD-200407-012"
},
{
"db": "NVD",
"id": "CVE-2004-0431"
}
]
},
"id": "VAR-200407-0077",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-8861"
}
],
"trust": 0.01
},
"last_update_date": "2024-06-09T23:13:11.097000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "top page",
"trust": 0.8,
"url": "https://www.apple.com/"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2004-000934"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-Other",
"trust": 1.0
},
{
"problemtype": "others (CWE-Other) [NVD evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2004-000934"
},
{
"db": "NVD",
"id": "CVE-2004-0431"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.5,
"url": "http://www.kb.cert.org/vuls/id/782958"
},
{
"trust": 1.9,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16026"
},
{
"trust": 1.8,
"url": "http://marc.info/?l=bugtraq\u0026m=108360110618389\u0026w=2"
},
{
"trust": 1.8,
"url": "http://marc.info/?l=ntbugtraq\u0026m=108356485013237\u0026w=2"
},
{
"trust": 1.7,
"url": "http://lists.apple.com/mhonarc/security-announce/msg00048.html"
},
{
"trust": 1.1,
"url": "http://www.eeye.com/html/research/advisories/ad20040502.html"
},
{
"trust": 0.9,
"url": "http://developer.apple.com/documentation/quicktime/qtff/index.html"
},
{
"trust": 0.9,
"url": "https://nvd.nist.gov/vuln/detail/cve-2004-0431"
},
{
"trust": 0.8,
"url": "http://secunia.com/advisories/11071/"
},
{
"trust": 0.8,
"url": "http://www.securitytracker.com/alerts/2004/apr/1010010.html"
},
{
"trust": 0.8,
"url": "http://www.securiteam.com/windowsntfocus/5np020kcvu.html"
},
{
"trust": 0.6,
"url": "http://xforce.iss.net/xforce/xfdb/16026"
},
{
"trust": 0.6,
"url": "http://marc.theaimsgroup.com/?l=ntbugtraq\u0026m=108356485013237\u0026w=2"
},
{
"trust": 0.6,
"url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=108360110618389\u0026w=2"
},
{
"trust": 0.1,
"url": "http://marc.info/?l=bugtraq\u0026amp;m=108360110618389\u0026amp;w=2"
},
{
"trust": 0.1,
"url": "http://marc.info/?l=ntbugtraq\u0026amp;m=108356485013237\u0026amp;w=2"
},
{
"trust": 0.1,
"url": "http://www.eeye.com"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#782958"
},
{
"db": "VULHUB",
"id": "VHN-8861"
},
{
"db": "BID",
"id": "10257"
},
{
"db": "JVNDB",
"id": "JVNDB-2004-000934"
},
{
"db": "PACKETSTORM",
"id": "33233"
},
{
"db": "CNNVD",
"id": "CNNVD-200407-012"
},
{
"db": "NVD",
"id": "CVE-2004-0431"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CERT/CC",
"id": "VU#782958"
},
{
"db": "VULHUB",
"id": "VHN-8861"
},
{
"db": "BID",
"id": "10257"
},
{
"db": "JVNDB",
"id": "JVNDB-2004-000934"
},
{
"db": "PACKETSTORM",
"id": "33233"
},
{
"db": "CNNVD",
"id": "CNNVD-200407-012"
},
{
"db": "NVD",
"id": "CVE-2004-0431"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2004-05-03T00:00:00",
"db": "CERT/CC",
"id": "VU#782958"
},
{
"date": "2004-07-07T00:00:00",
"db": "VULHUB",
"id": "VHN-8861"
},
{
"date": "2004-04-30T00:00:00",
"db": "BID",
"id": "10257"
},
{
"date": "2024-06-07T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2004-000934"
},
{
"date": "2004-05-04T02:52:16",
"db": "PACKETSTORM",
"id": "33233"
},
{
"date": "2004-04-30T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200407-012"
},
{
"date": "2004-07-07T04:00:00",
"db": "NVD",
"id": "CVE-2004-0431"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2004-05-04T00:00:00",
"db": "CERT/CC",
"id": "VU#782958"
},
{
"date": "2017-07-11T00:00:00",
"db": "VULHUB",
"id": "VHN-8861"
},
{
"date": "2009-07-12T04:07:00",
"db": "BID",
"id": "10257"
},
{
"date": "2024-06-07T08:59:00",
"db": "JVNDB",
"id": "JVNDB-2004-000934"
},
{
"date": "2005-10-20T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200407-012"
},
{
"date": "2017-07-11T01:30:09.510000",
"db": "NVD",
"id": "CVE-2004-0431"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "PACKETSTORM",
"id": "33233"
},
{
"db": "CNNVD",
"id": "CNNVD-200407-012"
}
],
"trust": 0.7
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Apple QuickTime contains an integer overflow in the \"QuickTime.qts\" extension",
"sources": [
{
"db": "CERT/CC",
"id": "VU#782958"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Boundary Condition Error",
"sources": [
{
"db": "BID",
"id": "10257"
},
{
"db": "CNNVD",
"id": "CNNVD-200407-012"
}
],
"trust": 0.9
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.