Page 23 of 229 results (0.011 seconds)

CVSS: 9.3EPSS: 93%CPEs: 122EXPL: 0

Heap-based buffer overflow in Apple QuickTime before 7.6.2 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted JP2 image. Desbordamiento de búfer basado en memoria dinámica (heap) en Apple QuickTime v7.6.2, permite a atacantes remotos ejecutar código de su elección o provocar una denegación de servicio (caída de aplicación) a través de una imagen JP2 manipulada. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists during the parsing of malformed Jpen2000 image files. A field is read directly from the file and used to allocate memory for a structure. • http://lists.apple.com/archives/security-announce/2009/Jun/msg00000.html http://osvdb.org/54873 http://secunia.com/advisories/35091 http://support.apple.com/kb/HT3591 http://www.securityfocus.com/bid/35165 http://www.securitytracker.com/id?1022314 http://www.vupen.com/english/advisories/2009/1469 https://exchange.xforce.ibmcloud.com/vulnerabilities/50898 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16155 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.3EPSS: 11%CPEs: 127EXPL: 0

Buffer overflow in Apple QuickTime before 7.6.2 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted compressed PSD image. Desbordamiento de búfer en Apple QuickTime anterior a v7.6.2, permite a atacantes remotos ejecutar código de su elección o provocar una denegación de servicio (caída de aplicación) a través de una imagen PSD comprimida y manipulada. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists when the application parses a malformed .PSD image. While decoding the columns, rows and channels in the image header, the application trusts a different length for copying than used for allocating it. • http://lists.apple.com/archives/security-announce/2009/Jun/msg00000.html http://osvdb.org/54877 http://secunia.com/advisories/35091 http://support.apple.com/kb/HT3591 http://www.securityfocus.com/bid/35168 http://www.securitytracker.com/id?1022314 http://www.vupen.com/english/advisories/2009/1469 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15793 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.3EPSS: 93%CPEs: 90EXPL: 0

Heap-based buffer overflow in Apple QuickTime before 7.6.2 on Windows allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a movie file containing crafted Clipping Region (CRGN) atom types. Desbordamiento de búfer basado en memoria dinámica en Apple QuickTime anterior a v7.6.2 en Windows permite a atacantes remotos ejecutar código arbitrario o producir una denegación de servicio (caída de aplicación) a través de un fichero de película que contenga una tipos de regiones de clipping manipuladas (CRNG) This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists when the application decodes a .MOV file containing a frame encoded with Quicktime's FIRE codec. While decoding the frame's contents, the application will trust the frame data contains a special terminator during copying of file data to a heap buffer. If the terminator is not found, the application will copy indefinitely. • http://lists.apple.com/archives/security-announce/2009/Jun/msg00000.html http://osvdb.org/54875 http://secunia.com/advisories/35091 http://support.apple.com/kb/HT3591 http://www.securityfocus.com/bid/35167 http://www.securitytracker.com/id?1022314 http://www.vupen.com/english/advisories/2009/1469 https://exchange.xforce.ibmcloud.com/vulnerabilities/50892 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15344 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.3EPSS: 2%CPEs: 43EXPL: 0

Heap-based buffer overflow in Apple QuickTime before 7.6 allows remote attackers to cause a denial of service (application termination) and possibly execute arbitrary code via a crafted RTSP URL. Desbordamiento de búfer basado en montículo en Apple QuickTime anterior a v7.6 permite a atacantes remotos provocar una denegación de servicio (cierre de aplicación) y posiblemente ejecutar código de su elección a través de una URL RTSP manipulada. • http://lists.apple.com/archives/security-announce/2009/Jan/msg00000.html http://secunia.com/advisories/33632 http://support.apple.com/kb/HT3403 http://www.securityfocus.com/bid/33385 http://www.us-cert.gov/cas/techalerts/TA09-022A.html http://www.vupen.com/english/advisories/2009/0212 https://exchange.xforce.ibmcloud.com/vulnerabilities/48154 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6135 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.3EPSS: 3%CPEs: 43EXPL: 0

Unspecified vulnerability in Apple QuickTime before 7.6 allows remote attackers to cause a denial of service (application termination) and possibly execute arbitrary code via a crafted H.263 encoded movie file that triggers memory corruption. Vulnerabilidad no especificada en QuickTime de Apple antes de v7.6 permite a atacantes remotos provocar una denegación de servicio (cierre de aplicación) y posiblemente ejecutar código de su elección mediante un archivo de vídeo con codificación H.263 manipulado que dispara una corrupción de memoria. • http://lists.apple.com/archives/security-announce/2009/Jan/msg00000.html http://secunia.com/advisories/33632 http://support.apple.com/kb/HT3403 http://www.securityfocus.com/bid/33386 http://www.us-cert.gov/cas/techalerts/TA09-022A.html http://www.vupen.com/english/advisories/2009/0212 https://exchange.xforce.ibmcloud.com/vulnerabilities/48158 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6187 • CWE-399: Resource Management Errors •