var-200512-0643
Vulnerability from variot
Heap-based buffer overflow in Apple Quicktime before 7.0.4 allows remote attackers to execute arbitrary code via a crafted (1) QuickTime Image File (QTIF), (2) PICT, or (3) JPEG format image with a long data field. Apple's QuickTime is a player for files and streaming media in a variety of different formats. QuickTime is prone to a remote heap-based overflow vulnerability. This issue presents itself when the application processes a specially crafted QTIF (QuickTime Image) file. A successful attack can result in a remote compromise. Apple QuickTime is prone to a buffer-overflow vulnerability because the application fails to do proper bounds checking on user-supplied data before copying it to finite-sized process buffers. Unsuccessful exploit attempts will most likely crash the application. This issue affects QuickTime 6.5.2 and 7.0.3; other versions may also be vulnerable. QuickTime 7.0.4 may also be vulnerable, but this has not been confirmed. This issue may have previously been discussed in BID 16202 (Apple QuickTime Multiple Code Execution Vulnerabilities). Quicktime will copy to the stack byte by byte when processing the data field of the qtif format file, but it does not perform the correct check, so it will cause a stack overflow in memory. The original function pointer value is 0x44332211. Just overflow it to 0x08332211 and make sure it doesn't crash before overflowing 0x44 to 0x08, and the code will execute. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
National Cyber Alert System
Technical Cyber Security Alert TA06-011A
Apple QuickTime Vulnerabilities
Original release date: January 11, 2006 Last revised: January 11, 2006 Source: US-CERT
Systems Affected
Apple QuickTime on systems running
* Apple Mac OS X
* Microsoft Windows XP
* Microsoft Windows 2000
Overview
Apple has released QuickTime 7.0.4 to correct multiple vulnerabilities. The impacts of these vulnerabilities include execution of arbitrary code and denial of service.
I. (CAN-2005-3713)
II. Impact
The impacts of these vulnerabilities vary. For information about specific impacts, please see the Vulnerability Notes. Potential consequences include remote execution of arbitrary code or commands and denial of service.
III. Solution
Upgrade
Upgrade to QuickTime 7.0.4.
Appendix A. References
* US-CERT Vulnerability Note VU#629845 -
<http://www.kb.cert.org/vuls/id/629845>
* US-CERT Vulnerability Note VU#921193 -
<http://www.kb.cert.org/vuls/id/921193>
* US-CERT Vulnerability Note VU#115729 -
<http://www.kb.cert.org/vuls/id/115729>
* US-CERT Vulnerability Note VU#150753 -
<http://www.kb.cert.org/vuls/id/150753>
* US-CERT Vulnerability Note VU#913449 -
<http://www.kb.cert.org/vuls/id/913449>
* CVE-2005-2340 -
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2340>
* CVE-2005-4092 -
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4092>
* CVE-2005-3707 -
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3707>
* CVE-2005-3710 -
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3710>
* CVE-2005-3713 -
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3713>
* Security Content for QuickTime 7.0.4 -
<http://docs.info.apple.com/article.html?artnum=303101>
* QuickTime 7.0.4 -
<http://www.apple.com/support/downloads/quicktime704.html>
* About the Mac OS X 10.4.4 Update (Delta) -
<http://docs.info.apple.com/article.html?artnum=302810>
The most recent version of this document can be found at:
<http://www.us-cert.gov/cas/techalerts/TA06-011A.html>
Feedback can be directed to US-CERT Technical Staff. Please send email to cert@cert.org with "TA06-011A Feedback VU#913449" in the subject.
For instructions on subscribing to or unsubscribing from this mailing list, visit http://www.us-cert.gov/cas/signup.html.
Produced 2006 by US-CERT, a government organization.
Terms of use:
<http://www.us-cert.gov/legal.html>
Revision History
January 11, 2006: Initial release
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux)
iQEVAwUBQ8V8iX0pj593lg50AQJ85wf+OuHVseQVzZ0uI8h8TnmtAJmjzV6tp3Cj 34jwpSLlvo5S8svIHChcX/BYOwKVL/uQZswsjk/mbEu+TrPcVKPd7VPCetxIXVey AdC5hsAH1Wm0MnvY1LgvONo8IQ9RlT6Rj6fY7k7QhPUWsYxj/rDCWDAY9kgsHXc/ HpXWL/Cy5va35z8aYHrLVlxmofKrOWtX0PVa6lSKV8lIsY+TDihA5tYIb5wRDVxL osieJ+MHSXGchXpjX2c0o6Ja6vhJNR61LEwelk9FMLT1JRTkp+wz9/AoVUSyZ/hy 0WBP0M8cwl8koWgijNcLXA18YX8QtDftAVRwpwHKMrbNCYdrWblYVw== =5Kiq -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200512-0643", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": null, "scope": null, "trust": 4.8, "vendor": "apple computer", "version": null }, { "model": "quicktime", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "7.0.2" }, { "model": "quicktime", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "7.0" }, { "model": "quicktime", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "7.0.1" }, { "model": "quicktime", "scope": "lte", "trust": 1.0, "vendor": "apple", "version": "7.0.3" }, { "model": "quicktime player", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "7.0.3" }, { "model": "quicktime player", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "7.0.2" }, { "model": "quicktime player", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "7.0.1" }, { "model": "quicktime player", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "7.0" }, { "model": "quicktime", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "7.0.3" }, { "model": "quicktime player", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "7.0.4" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.0.4" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "6.5.2" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "6.4" } ], "sources": [ { "db": "CERT/CC", "id": "VU#921193" }, { "db": "CERT/CC", "id": "VU#629845" }, { "db": "CERT/CC", "id": "VU#115729" }, { "db": "CERT/CC", "id": "VU#150753" }, { "db": "CERT/CC", "id": "VU#913449" }, { "db": "CERT/CC", "id": "VU#687201" }, { "db": "BID", "id": "16852" }, { "db": "BID", "id": "16212" }, { "db": "CNNVD", "id": "CNNVD-200512-952" }, { "db": "NVD", "id": "CVE-2005-2340" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:apple:quicktime:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:quicktime:7.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:quicktime:7.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:quicktime:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "7.0.3", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2005-2340" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Varun UppaleEye info@eEye.com", "sources": [ { "db": "CNNVD", "id": "CNNVD-200512-952" } ], "trust": 0.6 }, "cve": "CVE-2005-2340", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-13549", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2005-2340", "trust": 1.0, "value": "HIGH" }, { "author": "CARNEGIE MELLON", "id": "VU#921193", "trust": 0.8, "value": "43.88" }, { "author": "CARNEGIE MELLON", "id": "VU#629845", "trust": 0.8, "value": "18.23" }, { "author": "CARNEGIE MELLON", "id": "VU#115729", "trust": 0.8, "value": "3.85" }, { "author": "CARNEGIE MELLON", "id": "VU#150753", "trust": 0.8, "value": "32.63" }, { "author": "CARNEGIE MELLON", "id": "VU#913449", "trust": 0.8, "value": "3.85" }, { "author": "CARNEGIE MELLON", "id": "VU#687201", "trust": 0.8, "value": "16.40" }, { "author": "CNNVD", "id": "CNNVD-200512-952", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-13549", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#921193" }, { "db": "CERT/CC", "id": "VU#629845" }, { "db": "CERT/CC", "id": "VU#115729" }, { "db": "CERT/CC", "id": "VU#150753" }, { "db": "CERT/CC", "id": "VU#913449" }, { "db": "CERT/CC", "id": "VU#687201" }, { "db": "VULHUB", "id": "VHN-13549" }, { "db": "CNNVD", "id": "CNNVD-200512-952" }, { "db": "NVD", "id": "CVE-2005-2340" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Heap-based buffer overflow in Apple Quicktime before 7.0.4 allows remote attackers to execute arbitrary code via a crafted (1) QuickTime Image File (QTIF), (2) PICT, or (3) JPEG format image with a long data field. Apple\u0027s QuickTime is a player for files and streaming media in a variety of different formats. QuickTime is prone to a remote heap-based overflow vulnerability. \nThis issue presents itself when the application processes a specially crafted QTIF (QuickTime Image) file. \nA successful attack can result in a remote compromise. Apple QuickTime is prone to a buffer-overflow vulnerability because the application fails to do proper bounds checking on user-supplied data before copying it to finite-sized process buffers. Unsuccessful exploit attempts will most likely crash the application. \nThis issue affects QuickTime 6.5.2 and 7.0.3; other versions may also be vulnerable. QuickTime 7.0.4 may also be vulnerable, but this has not been confirmed. \nThis issue may have previously been discussed in BID 16202 (Apple QuickTime Multiple Code Execution Vulnerabilities). Quicktime will copy to the stack byte by byte when processing the data field of the qtif format file, but it does not perform the correct check, so it will cause a stack overflow in memory. The original function pointer value is 0x44332211. Just overflow it to 0x08332211 and make sure it doesn\u0027t crash before overflowing 0x44 to 0x08, and the code will execute. \n-----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n \n National Cyber Alert System\n\n Technical Cyber Security Alert TA06-011A\n\n\nApple QuickTime Vulnerabilities\n\n Original release date: January 11, 2006\n Last revised: January 11, 2006\n Source: US-CERT\n\nSystems Affected\n\n Apple QuickTime on systems running\n\n * Apple Mac OS X\n * Microsoft Windows XP\n * Microsoft Windows 2000\n\n\nOverview\n\n Apple has released QuickTime 7.0.4 to correct multiple\n vulnerabilities. The impacts of these vulnerabilities include\n execution of arbitrary code and denial of service. \n\n\nI. \n (CAN-2005-3713)\n\n\nII. Impact\n\n The impacts of these vulnerabilities vary. For information about\n specific impacts, please see the Vulnerability Notes. Potential\n consequences include remote execution of arbitrary code or commands\n and denial of service. \n\n\nIII. Solution\n\nUpgrade\n\n Upgrade to QuickTime 7.0.4. \n\n\nAppendix A. References\n\n * US-CERT Vulnerability Note VU#629845 -\n \u003chttp://www.kb.cert.org/vuls/id/629845\u003e\n\n * US-CERT Vulnerability Note VU#921193 -\n \u003chttp://www.kb.cert.org/vuls/id/921193\u003e\n\n * US-CERT Vulnerability Note VU#115729 -\n \u003chttp://www.kb.cert.org/vuls/id/115729\u003e\n\n * US-CERT Vulnerability Note VU#150753 -\n \u003chttp://www.kb.cert.org/vuls/id/150753\u003e\n\n * US-CERT Vulnerability Note VU#913449 -\n \u003chttp://www.kb.cert.org/vuls/id/913449\u003e\n\n * CVE-2005-2340 -\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2340\u003e\n\n * CVE-2005-4092 -\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4092\u003e\n\n * CVE-2005-3707 -\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3707\u003e\n\n * CVE-2005-3710 -\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3710\u003e\n\n * CVE-2005-3713 -\n \u003chttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3713\u003e\n\n * Security Content for QuickTime 7.0.4 -\n \u003chttp://docs.info.apple.com/article.html?artnum=303101\u003e\n\n * QuickTime 7.0.4 -\n \u003chttp://www.apple.com/support/downloads/quicktime704.html\u003e\n\n * About the Mac OS X 10.4.4 Update (Delta) -\n \u003chttp://docs.info.apple.com/article.html?artnum=302810\u003e\n\n\n ____________________________________________________________________\n\n The most recent version of this document can be found at:\n\n \u003chttp://www.us-cert.gov/cas/techalerts/TA06-011A.html\u003e\n ____________________________________________________________________\n\n Feedback can be directed to US-CERT Technical Staff. Please send\n email to \u003ccert@cert.org\u003e with \"TA06-011A Feedback VU#913449\" in the\n subject. \n ____________________________________________________________________\n\n For instructions on subscribing to or unsubscribing from this\n mailing list, visit \u003chttp://www.us-cert.gov/cas/signup.html\u003e. \n ____________________________________________________________________\n\n Produced 2006 by US-CERT, a government organization. \n\n Terms of use:\n\n \u003chttp://www.us-cert.gov/legal.html\u003e\n ____________________________________________________________________\n\n\n\nRevision History\n\n January 11, 2006: Initial release\n\n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.2.1 (GNU/Linux)\n\niQEVAwUBQ8V8iX0pj593lg50AQJ85wf+OuHVseQVzZ0uI8h8TnmtAJmjzV6tp3Cj\n34jwpSLlvo5S8svIHChcX/BYOwKVL/uQZswsjk/mbEu+TrPcVKPd7VPCetxIXVey\nAdC5hsAH1Wm0MnvY1LgvONo8IQ9RlT6Rj6fY7k7QhPUWsYxj/rDCWDAY9kgsHXc/\nHpXWL/Cy5va35z8aYHrLVlxmofKrOWtX0PVa6lSKV8lIsY+TDihA5tYIb5wRDVxL\nosieJ+MHSXGchXpjX2c0o6Ja6vhJNR61LEwelk9FMLT1JRTkp+wz9/AoVUSyZ/hy\n0WBP0M8cwl8koWgijNcLXA18YX8QtDftAVRwpwHKMrbNCYdrWblYVw==\n=5Kiq\n-----END PGP SIGNATURE-----\n", "sources": [ { "db": "NVD", "id": "CVE-2005-2340" }, { "db": "CERT/CC", "id": "VU#921193" }, { "db": "CERT/CC", "id": "VU#629845" }, { "db": "CERT/CC", "id": "VU#115729" }, { "db": "CERT/CC", "id": "VU#150753" }, { "db": "CERT/CC", "id": "VU#913449" }, { "db": "CERT/CC", "id": "VU#687201" }, { "db": "BID", "id": "16852" }, { "db": "BID", "id": "16212" }, { "db": "VULHUB", "id": "VHN-13549" }, { "db": "PACKETSTORM", "id": "43062" } ], "trust": 5.94 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-13549", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-13549" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "SECUNIA", "id": "18370", "trust": 5.7 }, { "db": "CERT/CC", "id": "VU#629845", "trust": 2.6 }, { "db": "BID", "id": "16202", "trust": 2.5 }, { "db": "CERT/CC", "id": "VU#687201", "trust": 2.5 }, { "db": "NVD", "id": "CVE-2005-2340", "trust": 2.5 }, { "db": "BID", "id": "16212", "trust": 2.0 }, { "db": "USCERT", "id": "TA06-011A", "trust": 1.8 }, { "db": "OSVDB", "id": "22334", "trust": 1.7 }, { "db": "OSVDB", "id": "22335", "trust": 1.7 }, { "db": "OSVDB", "id": "22333", "trust": 1.7 }, { "db": "SECTRACK", "id": "1015463", "trust": 1.7 }, { "db": "VUPEN", "id": "ADV-2006-0128", "trust": 1.7 }, { "db": "SREASON", "id": "332", "trust": 1.7 }, { "db": "SECTRACK", "id": "1015466", "trust": 1.6 }, { "db": "CERT/CC", "id": "VU#921193", "trust": 0.9 }, { "db": "CERT/CC", "id": "VU#115729", "trust": 0.9 }, { "db": "CERT/CC", "id": "VU#150753", "trust": 0.9 }, { "db": "CERT/CC", "id": "VU#913449", "trust": 0.9 }, { "db": "OSVDB", "id": "22337", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200512-952", "trust": 0.7 }, { "db": "CERT/CC", "id": "TA06-011A", "trust": 0.6 }, { "db": "FULLDISC", "id": "20060111 [CIRT.DK] APPLE QUICKTIME 7.0.3 AND EARLIER - JPG/PICT BUFFER OVERFLOW", "trust": 0.6 }, { "db": "FULLDISC", "id": "20060111 UPDATED ADVISORIES - INCORRECT CVE INFORMATION", "trust": 0.6 }, { "db": "FULLDISC", "id": "20060111 [EEYEB-20051220] APPLE QUICKTIME QTIF STACK OVERFLOW", "trust": 0.6 }, { "db": "NSFOCUS", "id": "8392", "trust": 0.6 }, { "db": "NSFOCUS", "id": "8395", "trust": 0.6 }, { "db": "NSFOCUS", "id": "8395\u203b8392\u203b8394\u203b8393", "trust": 0.6 }, { "db": "NSFOCUS", "id": "8393", "trust": 0.6 }, { "db": "NSFOCUS", "id": "8394", "trust": 0.6 }, { "db": "APPLE", "id": "APPLE-SA-2006-01-10", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "20060111 UPDATED ADVISORIES - INCORRECT CVE INFORMATION", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "20060111 [EEYEB-20051220] APPLE QUICKTIME QTIF STACK OVERFLOW", "trust": 0.6 }, { "db": "XF", "id": "24054", "trust": 0.6 }, { "db": "BID", "id": "16852", "trust": 0.4 }, { "db": "PACKETSTORM", "id": "43054", "trust": 0.2 }, { "db": "EXPLOIT-DB", "id": "27069", "trust": 0.1 }, { "db": "SEEBUG", "id": "SSVID-80689", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-13549", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "43062", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#921193" }, { "db": "CERT/CC", "id": "VU#629845" }, { "db": "CERT/CC", "id": "VU#115729" }, { "db": "CERT/CC", "id": "VU#150753" }, { "db": "CERT/CC", "id": "VU#913449" }, { "db": "CERT/CC", "id": "VU#687201" }, { "db": "VULHUB", "id": "VHN-13549" }, { "db": "BID", "id": "16852" }, { "db": "BID", "id": "16212" }, { "db": "PACKETSTORM", "id": "43054" }, { "db": "PACKETSTORM", "id": "43062" }, { "db": "CNNVD", "id": "CNNVD-200512-952" }, { "db": "NVD", "id": "CVE-2005-2340" } ] }, "id": "VAR-200512-0643", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-13549" } ], "trust": 0.01 }, "last_update_date": "2024-07-23T22:24:53.371000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-13549" }, { "db": "NVD", "id": "CVE-2005-2340" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 5.7, "url": "http://docs.info.apple.com/article.html?artnum=303101" }, { "trust": 4.0, "url": "http://secunia.com/advisories/18370/" }, { "trust": 2.5, "url": "http://www.securityfocus.com/bid/16202" }, { "trust": 2.0, "url": "http://www.cirt.dk/advisories/cirt-41-advisory.pdf" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/16212" }, { "trust": 1.7, "url": "http://www.us-cert.gov/cas/techalerts/ta06-011a.html" }, { "trust": 1.7, "url": "http://www.kb.cert.org/vuls/id/629845" }, { "trust": 1.7, "url": "http://www.kb.cert.org/vuls/id/687201" }, { "trust": 1.7, "url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-01/0402.html" }, { "trust": 1.7, "url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-01/0392.html" }, { "trust": 1.7, "url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-01/0398.html" }, { "trust": 1.7, "url": "http://www.osvdb.org/22333" }, { "trust": 1.7, "url": "http://www.osvdb.org/22334" }, { "trust": 1.7, "url": "http://www.osvdb.org/22335" }, { "trust": 1.7, "url": "http://securitytracker.com/id?1015463" }, { "trust": 1.7, "url": "http://secunia.com/advisories/18370" }, { "trust": 1.7, "url": "http://securityreason.com/securityalert/332" }, { "trust": 1.6, "url": "http://securitytracker.com/alerts/2006/jan/1015466.html" }, { "trust": 1.1, "url": "http://www.securityfocus.com/archive/1/421547/100/0/threaded" }, { "trust": 1.1, "url": "http://www.securityfocus.com/archive/1/421566/100/0/threaded" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2006/0128" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24054" }, { "trust": 0.8, "url": "http://www.eeye.com/html/research/advisories/ad20060111a.html" }, { "trust": 0.8, "url": "about vulnerability notes" }, { "trust": 0.8, "url": "contact us about this vulnerability" }, { "trust": 0.8, "url": "provide a vendor statement" }, { "trust": 0.8, "url": "http://www.osvdb.org/displayvuln.php?osvdb_id=22337" }, { "trust": 0.8, "url": "http://www.eeye.com/html/research/advisories/ad20060111d.html" }, { "trust": 0.8, "url": "http://www.eeye.com/html/research/advisories/ad20060111b.html" }, { "trust": 0.8, "url": "http://developer.apple.com/documentation/quicktime/ref/refimporter.4.htm" }, { "trust": 0.8, "url": "http://docs.info.apple.com/article.html?artnum=61798" }, { "trust": 0.6, "url": "http://www.apple.com/quicktime/" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/24054" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2006/0128" }, { "trust": 0.6, "url": "http://www.securityfocus.com/archive/1/archive/1/421566/100/0/threaded" }, { "trust": 0.6, "url": "http://www.securityfocus.com/archive/1/archive/1/421547/100/0/threaded" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/8395\u203b8392\u203b8394\u203b8393" }, { "trust": 0.3, "url": "/archive/1/421561" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2005-2340" }, { "trust": 0.1, "url": "" }, { "trust": 0.1, "url": "http://www.kb.cert.org/vuls/id/913449\u003e" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2005-3710" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2005-4092" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2005-4092\u003e" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2005-3710\u003e" }, { "trust": 0.1, "url": "http://www.kb.cert.org/vuls/id/629845\u003e" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2005-3713\u003e" }, { "trust": 0.1, "url": "http://www.us-cert.gov/cas/techalerts/ta06-011a.html\u003e" }, { "trust": 0.1, "url": "http://www.us-cert.gov/cas/signup.html\u003e." }, { "trust": 0.1, "url": "http://docs.info.apple.com/article.html?artnum=302810\u003e" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2005-3707\u003e" }, { "trust": 0.1, "url": "http://www.kb.cert.org/vuls/id/115729\u003e" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2005-2340\u003e" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2005-3707" }, { "trust": 0.1, "url": "http://www.apple.com/support/downloads/quicktime704.html\u003e" }, { "trust": 0.1, "url": "http://www.kb.cert.org/vuls/id/921193\u003e" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2005-3713" }, { "trust": 0.1, "url": "http://www.kb.cert.org/vuls/id/150753\u003e" }, { "trust": 0.1, "url": "http://docs.info.apple.com/article.html?artnum=303101\u003e" }, { "trust": 0.1, "url": "http://www.us-cert.gov/legal.html\u003e" } ], "sources": [ { "db": "CERT/CC", "id": "VU#921193" }, { "db": "CERT/CC", "id": "VU#629845" }, { "db": "CERT/CC", "id": "VU#115729" }, { "db": "CERT/CC", "id": "VU#150753" }, { "db": "CERT/CC", "id": "VU#913449" }, { "db": "CERT/CC", "id": "VU#687201" }, { "db": "VULHUB", "id": "VHN-13549" }, { "db": "BID", "id": "16852" }, { "db": "BID", "id": "16212" }, { "db": "PACKETSTORM", "id": "43054" }, { "db": "PACKETSTORM", "id": "43062" }, { "db": "CNNVD", "id": "CNNVD-200512-952" }, { "db": "NVD", "id": "CVE-2005-2340" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#921193" }, { "db": "CERT/CC", "id": "VU#629845" }, { "db": "CERT/CC", "id": "VU#115729" }, { "db": "CERT/CC", "id": "VU#150753" }, { "db": "CERT/CC", "id": "VU#913449" }, { "db": "CERT/CC", "id": "VU#687201" }, { "db": "VULHUB", "id": "VHN-13549" }, { "db": "BID", "id": "16852" }, { "db": "BID", "id": "16212" }, { "db": "PACKETSTORM", "id": "43054" }, { "db": "PACKETSTORM", "id": "43062" }, { "db": "CNNVD", "id": "CNNVD-200512-952" }, { "db": "NVD", "id": "CVE-2005-2340" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2006-01-11T00:00:00", "db": "CERT/CC", "id": "VU#921193" }, { "date": "2006-01-11T00:00:00", "db": "CERT/CC", "id": "VU#629845" }, { "date": "2006-01-11T00:00:00", "db": "CERT/CC", "id": "VU#115729" }, { "date": "2006-01-11T00:00:00", "db": "CERT/CC", "id": "VU#150753" }, { "date": "2006-01-11T00:00:00", "db": "CERT/CC", "id": "VU#913449" }, { "date": "2006-01-11T00:00:00", "db": "CERT/CC", "id": "VU#687201" }, { "date": "2005-12-31T00:00:00", "db": "VULHUB", "id": "VHN-13549" }, { "date": "2006-01-10T00:00:00", "db": "BID", "id": "16852" }, { "date": "2006-01-11T00:00:00", "db": "BID", "id": "16212" }, { "date": "2006-01-15T15:22:47", "db": "PACKETSTORM", "id": "43054" }, { "date": "2006-01-15T15:39:24", "db": "PACKETSTORM", "id": "43062" }, { "date": "2005-12-31T00:00:00", "db": "CNNVD", "id": "CNNVD-200512-952" }, { "date": "2005-12-31T05:00:00", "db": "NVD", "id": "CVE-2005-2340" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2006-01-12T00:00:00", "db": "CERT/CC", "id": "VU#921193" }, { "date": "2006-01-13T00:00:00", "db": "CERT/CC", "id": "VU#629845" }, { "date": "2006-01-11T00:00:00", "db": "CERT/CC", "id": "VU#115729" }, { "date": "2006-01-13T00:00:00", "db": "CERT/CC", "id": "VU#150753" }, { "date": "2006-01-31T00:00:00", "db": "CERT/CC", "id": "VU#913449" }, { "date": "2006-01-20T00:00:00", "db": "CERT/CC", "id": "VU#687201" }, { "date": "2018-10-19T00:00:00", "db": "VULHUB", "id": "VHN-13549" }, { "date": "2015-05-12T19:49:00", "db": "BID", "id": "16852" }, { "date": "2007-11-15T00:35:00", "db": "BID", "id": "16212" }, { "date": "2006-05-24T00:00:00", "db": "CNNVD", "id": "CNNVD-200512-952" }, { "date": "2018-10-19T15:32:44.720000", "db": "NVD", "id": "CVE-2005-2340" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "network", "sources": [ { "db": "BID", "id": "16852" }, { "db": "BID", "id": "16212" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Apple QuickTime fails to properly handle corrupt media files", "sources": [ { "db": "CERT/CC", "id": "VU#921193" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Boundary Condition Error", "sources": [ { "db": "BID", "id": "16852" }, { "db": "BID", "id": "16212" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.