Page 42 of 220 results (0.007 seconds)

CVSS: 7.5EPSS: 94%CPEs: 2EXPL: 0

Multiple heap-based buffer overflows in QuickTime.qts in Apple QuickTime Player 7.0.3 and iTunes 6.0.1 (3) and earlier allow remote attackers to cause a denial of service (crash) and execute arbitrary code via a .mov file with (1) a Movie Resource atom with a large size value, or (2) an stsd atom with a modified Sample Description Table size value, and possibly other vectors involving media files. NOTE: item 1 was originally identified by CVE-2005-4127 for a pre-patch announcement, and item 2 was originally identified by CVE-2005-4128 for a pre-patch announcement. • http://docs.info.apple.com/article.html?artnum=303101 http://secunia.com/advisories/18149 http://secunia.com/advisories/18370 http://security-protocols.com/advisory/sp-x21-advisory.txt http://securityreason.com/securityalert/334 http://securityreason.com/securityalert/336 http://securitytracker.com/id?1015356 http://securitytracker.com/id?1015396 http://securitytracker.com/id?1015397 http://www.eeye.com/html/research/upcoming/20051117a.html http://www.eeye.com/html/research/upcoming/2005 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.1EPSS: 14%CPEs: 7EXPL: 0

Apple QuickTime before 7.0.3 allows user-assisted attackers to overwrite memory and execute arbitrary code via a crafted PICT file that triggers an overflow during expansion. • http://docs.info.apple.com/article.html?artnum=302772 http://pb.specialised.info/all/adv/quicktime-pict-adv.txt http://secunia.com/advisories/17428 http://securityreason.com/securityalert/144 http://securitytracker.com/id?1015152 http://www.kb.cert.org/vuls/id/855118 http://www.osvdb.org/20478 http://www.securityfocus.com/archive/1/415714/30/0/threaded http://www.securityfocus.com/bid/15309 http://www.vupen.com/english/advisories/2005/2293 •

CVSS: 2.6EPSS: 0%CPEs: 7EXPL: 0

Apple QuickTime Player before 7.0.3 allows user-assisted attackers to cause a denial of service (crash) via a crafted file with a missing movie attribute, which leads to a null dereference. • http://archives.neohapsis.com/archives/fulldisclosure/2005-11/0102.html http://docs.info.apple.com/article.html?artnum=302772 http://pb.specialised.info/all/adv/quicktime-mov-dos-adv.txt http://secunia.com/advisories/17428 http://securityreason.com/securityalert/145 http://securitytracker.com/id?1015152 http://www.osvdb.org/20477 http://www.securityfocus.com/archive/1/415717/30/0/threaded http://www.securityfocus.com/bid/15307 http://www.vupen.com/english/advisories/2005/2293 •

CVSS: 5.1EPSS: 1%CPEs: 7EXPL: 0

Integer overflow in Apple QuickTime before 7.0.3 allows user-assisted attackers to execute arbitrary code via a crafted MOV file with "Improper movie attributes." • http://docs.info.apple.com/article.html?artnum=302772 http://pb.specialised.info/all/adv/quicktime-mov-io2-adv.txt http://secunia.com/advisories/17428 http://securitytracker.com/id?1015152 http://www.osvdb.org/20476 http://www.securityfocus.com/archive/1/415709/30/0/threaded http://www.securityfocus.com/bid/15308 http://www.vupen.com/english/advisories/2005/2293 • CWE-189: Numeric Errors •

CVSS: 5.1EPSS: 1%CPEs: 7EXPL: 0

Integer overflow in Apple QuickTime before 7.0.3 allows user-assisted attackers to execute arbitrary code via a crafted MOV file that causes a sign extension of the length element in a Pascal style string. • http://docs.info.apple.com/article.html?artnum=302772 http://pb.specialised.info/all/adv/quicktime-mov-io1-adv.txt http://secunia.com/advisories/17428 http://securitytracker.com/id?1015152 http://www.osvdb.org/20475 http://www.securityfocus.com/archive/1/415712/30/0/threaded http://www.securityfocus.com/bid/15306 http://www.vupen.com/english/advisories/2005/2293 • CWE-189: Numeric Errors •