CVE-2006-4388
https://notcve.org/view.php?id=CVE-2006-4388
Integer overflow in Apple QuickTime before 7.1.3 allows user-assisted remote attackers to execute arbitrary code via a crafted FlashPix file. Desbordamiento de enteros en Apple QuickTime anterior a 7.1.3 permite a un atacante con la complicidad del usuario ejecutar código de su elección a través de un fichero artesanal FlashPix. • http://docs.info.apple.com/article.html?artnum=304357 http://lists.apple.com/archives/Security-announce/2006/Sep/msg00000.html http://secunia.com/advisories/21893 http://secunia.com/advisories/29182 http://security.gentoo.org/glsa/glsa-200803-08.xml http://securityreason.com/securityalert/1554 http://securitytracker.com/id?1016830 http://www.kb.cert.org/vuls/id/200316 http://www.osvdb.org/28770 http://www.securityfocus.com/archive/1/445888/100/0/threaded http://www. •
CVE-2006-4385
https://notcve.org/view.php?id=CVE-2006-4385
Buffer overflow in Apple QuickTime before 7.1.3 allows user-assisted remote attackers to execute arbitrary code via a crafted SGI image. Desbordamiento de búfer en Apple QuickTime anterior a 7.1.3 permite a un atacante con la complicidad del usuario ejecutar código de su elección a rtavés de una imagen artesanal SGI. • http://docs.info.apple.com/article.html?artnum=304357 http://lists.apple.com/archives/Security-announce/2006/Sep/msg00000.html http://secunia.com/advisories/21893 http://secunia.com/advisories/29182 http://security.gentoo.org/glsa/glsa-200803-08.xml http://securityreason.com/securityalert/1554 http://securitytracker.com/id?1016830 http://www.kb.cert.org/vuls/id/308204 http://www.osvdb.org/28768 http://www.securityfocus.com/archive/1/445888/100/0/threaded http://www. •
CVE-2006-4384 – Apple QuickTime 6/7 - '.FLC' Movie COLOR_64 Chunk Overflow
https://notcve.org/view.php?id=CVE-2006-4384
Heap-based buffer overflow in Apple QuickTime before 7.1.3 allows user-assisted remote attackers to execute arbitrary code via the COLOR_64 chunk in a FLIC (FLC) movie. Desbordamiento de búfer basado en montón en Apple QuickTime anterior a 7.1.3 permite a un atacante con la complicidad del usuario ejecutar código de su elección a través de un trozo de COLOR_64 en una película FLIC(FLC). • https://www.exploit-db.com/exploits/28521 http://docs.info.apple.com/article.html?artnum=304357 http://lists.apple.com/archives/Security-announce/2006/Sep/msg00000.html http://secunia.com/advisories/21893 http://secunia.com/advisories/29182 http://security.gentoo.org/glsa/glsa-200803-08.xml http://securityreason.com/securityalert/1554 http://securitytracker.com/id?1016830 http://www.idefense.com/intelligence/vulnerabilities/display.php?id=413 http://www.kb.cert.org/vuls/id/489836& •
CVE-2006-4386
https://notcve.org/view.php?id=CVE-2006-4386
Integer overflow in Apple QuickTime before 7.1.3 allows user-assisted remote attackers to execute arbitrary code via a crafted H.264 movie, a different issue than CVE-2006-4381. Desbordamiento de enteros en Apple QuickTime anterior a 7.1.3 permite a un atacante con la complicidad del usuario ejecutar código de su elección a través de una película H.624 artesanal, una cuestión diferente a CVE-2006-4381. • http://docs.info.apple.com/article.html?artnum=304357 http://lists.apple.com/archives/Security-announce/2006/Sep/msg00000.html http://piotrbania.com/all/adv/quicktime-integer-overflow-h264-adv-7.1.txt http://secunia.com/advisories/21893 http://secunia.com/advisories/29182 http://security.gentoo.org/glsa/glsa-200803-08.xml http://securityreason.com/securityalert/1550 http://securitytracker.com/id?1016830 http://www.kb.cert.org/vuls/id/554252 http://www.osvdb.org/28773 http •
CVE-2006-4389
https://notcve.org/view.php?id=CVE-2006-4389
Apple QuickTime before 7.1.3 allows user-assisted remote attackers to execute arbitrary code via a crafted FlashPix (FPX) file, which triggers an exception that leads to an operation on an uninitialized object. Apple QuickTime anterior 7.1.3 permite a un atacante con la complicidad de un usuario ejecutar código de su elección a través de un fichero artesanal FlashPix (FPX), los cuales dispararán una excepción que conduce a una operación sobre un objeto no inicializado. • http://docs.info.apple.com/article.html?artnum=304357 http://lists.apple.com/archives/Security-announce/2006/Sep/msg00000.html http://secunia.com/advisories/21893 http://secunia.com/advisories/29182 http://security.gentoo.org/glsa/glsa-200803-08.xml http://securityreason.com/securityalert/1554 http://securitytracker.com/id?1016830 http://www.kb.cert.org/vuls/id/540348 http://www.osvdb.org/28769 http://www.securityfocus.com/archive/1/445888/100/0/threaded http://www. •