Page 30 of 186 results (0.009 seconds)

CVSS: 9.3EPSS: 48%CPEs: 6EXPL: 0

Heap-based buffer overflow in the QuickTime VR extension 7.2.0.240 in QuickTime.qts in Apple QuickTime before 7.3 allows remote attackers to execute arbitrary code via a QTVR (QuickTime Virtual Reality) movie file containing a large size field in the atom header of a panorama sample atom. Un desbordamiento de búfer en la región stack de la memoria en la extensión de QuickTime VR versión 7.2.0.240 en QuickTime.qts en QuickTime de Apple anterior a versión 7.3, permite a los atacantes remotos ejecutar los códigos arbitrarios por medio de un archivo de película QTVR (Realidad Virtual de QuickTime) que contiene un campo de gran tamaño en el encabezado atom de un panorama sample atom. • http://blog.48bits.com/?p=176 http://docs.info.apple.com/article.html?artnum=306896 http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=620 http://lists.apple.com/archives/Security-announce/2007/Nov/msg00000.html http://secunia.com/advisories/27523 http://www.48bits.com/advisories/qt_pdat_heapbof.pdf http://www.osvdb.org/38545 http://www.securityfocus.com/archive/1/483564/100/0/threaded http://www.securityfocus.com/bid/26342 http://www.securitytracker.com& • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.3EPSS: 94%CPEs: 6EXPL: 0

Heap-based buffer overflow in Apple QuickTime before 7.3 allows remote attackers to execute arbitrary code via malformed elements when parsing (1) Poly type (0x0070 through 0x0074) and (2) PackBitsRgn field (0x0099) opcodes in a PICT image. Desbordamiento de búfer basado en montículo en Apple QuickTime anterior a 7.3 permite a atacantes remotos ejecutar código de su elección mediante elementos mal formados cuando se analizan los códigos de operación (opcodes) (1)Poly type (0x0070 hasta 0x0074) y (2) PackBitsRgn field (0x0099)en una imagen PICT. This vulnerability allows attackers to execute arbitrary code on vulnerable installations of Apple QuickTime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exist in the parsing of Poly type opcodes (opcodes 0x0070-74). Due to improper handling of a malformed element in the structure heap corruption occurs. • http://docs.info.apple.com/article.html?artnum=306896 http://lists.apple.com/archives/Security-announce/2007/Nov/msg00000.html http://osvdb.org/38546 http://secunia.com/advisories/27523 http://securityreason.com/securityalert/3351 http://www.kb.cert.org/vuls/id/690515 http://www.securityfocus.com/archive/1/483311/100/0/threaded http://www.securityfocus.com/archive/1/483313/100/0/threaded http://www.securityfocus.com/bid/26345 http://www.securitytracker.com/id?1018894 htt • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.3EPSS: 77%CPEs: 6EXPL: 0

Heap-based buffer overflow in Apple QuickTime before 7.3 allows remote attackers to execute arbitrary code via an invalid color table size when parsing the color table atom (CTAB) in a movie file, related to the CTAB RGB values. Desbordamiento de búfer basado en montículo en Apple QuickTime anterior a 7.3 permite a atacantes remotos ejecutar código de su elección mediante un tamaño inválido de tabla de color cuando se analiza el átomo de tabla de color (color table atom o CTAB) en un archivo de película, relacionado con los valores CTAB RGB. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime. User interaction is required to exploit this vulnerability in that the target must open a malicious file. The specific flaw exists in the parsing of the CTAB atom. While reading the CTAB RGB values, an invalid color table size can cause QuickTime to write past the end of the heap chunk. • http://docs.info.apple.com/article.html?artnum=306896 http://lists.apple.com/archives/Security-announce/2007/Nov/msg00000.html http://secunia.com/advisories/27523 http://securityreason.com/securityalert/3352 http://www.kb.cert.org/vuls/id/445083 http://www.osvdb.org/38544 http://www.securityfocus.com/archive/1/483312/100/0/threaded http://www.securityfocus.com/bid/26338 http://www.securitytracker.com/id?1018894 http://www.us-cert.gov/cas/techalerts/TA07-310A.html http&# • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.6EPSS: 25%CPEs: 6EXPL: 0

Stack-based buffer overflow in Apple QuickTime before 7.3 allows remote attackers to execute arbitrary code via an invalid UncompressedQuickTimeData opcode length in a PICT image. Desbordamiento de búfer basado en pila en Apple QuickTime anterior a 7.3 permite a atacantes remotos ejecutar código de su elección mediante una longitud de código de operación (opcode) UncompressedQuickTimeData inválida en una imagen PICT. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime. User interaction is required to exploit this vulnerability in that the target must open a malicious image file. The specific flaw exists in the parsing of the pict file format. If an invalid length is specified for the UncompressedQuickTimeData opcode, a stack based buffer overflow occurs, allowing the execution of arbitrary code. • http://docs.info.apple.com/article.html?artnum=306896 http://lists.apple.com/archives/Security-announce/2007/Nov/msg00000.html http://osvdb.org/38547 http://secunia.com/advisories/27523 http://securityreason.com/securityalert/3350 http://www.securityfocus.com/archive/1/483314/100/0/threaded http://www.securityfocus.com/bid/26344 http://www.securitytracker.com/id?1018894 http://www.us-cert.gov/cas/techalerts/TA07-310A.html http://www.vupen.com/english/advisories/2007/3723 h • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.3EPSS: 0%CPEs: 2EXPL: 0

Argument injection vulnerability in Apple QuickTime 7.1.5 and earlier, when running on systems with Mozilla Firefox before 2.0.0.7 installed, allows remote attackers to execute arbitrary commands via a QuickTime Media Link (QTL) file with an embed XML element and a qtnext parameter containing the Firefox "-chrome" argument. NOTE: this is a related issue to CVE-2006-4965 and the result of an incomplete fix for CVE-2007-3670. Vulnerabilidad de inyección de argumentos en Apple QuickTime 7.1.5 y anteriores, cuando se ejecutan en sistemas con Mozilla Firefox anterior a 2.0.0.7 instalado, permite a atacantes remotos ejecutar comandos de su elección mediante un archivo de Enlace a Medios QuickTime (QuickTime Media Link o QTL) con un elemento XML embed y un parámetro qtnext que contiene el argumento de Firefox "-chrome". NOTA: este es un problema relacionado con CVE-2006-4965 y el resultado de un arreglo incompleto para CVE-2007-3670. • http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742 http://secunia.com/advisories/26881 http://sunsolve.sun.com/search/document.do?assetkey=1-66-201516-1 http://www.gnucitizen.org/blog/0day-quicktime-pwns-firefox http://www.mozilla.org/security/announce/2007/mfsa2007-28.html http://www.novell.com/linux/security/advisories/2007_57_mozilla.html http://www.securityfocus.com/archive/1/479179/100/0/threaded http://www.vupen.com/english/advisories/2007/3197 http • CWE-94: Improper Control of Generation of Code ('Code Injection') •