APPLE-SA-2006-09-12 QuickTime 7.1.3QuickTime 7.1.3 is now available. Along with functionality
improvements (see release notes), it also provides fixes for the
following security issues:QuickTime
CVE-ID: CVE-2006-4381, CVE-2006-4386
Available for: Mac OS X v10.3.9 and later, Windows XP/2000
Impact: Viewing a maliciously-crafted H.264 movie may lead to an
application crash or arbitrary code execution
Description: By carefully crafting a corrupt H.264 movie, an
attacker can trigger an integer overflow or buffer overflow
which may lead to an application crash or arbitrary code
execution with the privileges of the user. This update addresses
the issue by performing additional validation of H.264 movies.
Credit to Sowhat of Nevis Labs, Mike Price of McAfee AVERT Labs,
and Piotr Bania of piotrbania.com for reporting these issues.QuickTime
CVE-ID: CVE-2006-4382
Available for: Mac OS X v10.3.9 and later, Windows XP/2000
Impact: Viewing a maliciously-crafted QuickTime movie may lead
to an application crash or arbitrary code execution
Description: By carefully crafting a corrupt QuickTime movie, an
attacker can trigger a buffer overflow which may lead to an
application crash or arbitrary code execution with the
privileges of the user. This update addresses the issue by
performing additional validation of QuickTime movies. Credit to
Mike Price of McAfee AVERT Labs for reporting this issue.QuickTime
CVE-ID: CVE-2006-4384
Available for: Mac OS X v10.3.9 and later, Windows XP/2000
Impact: Viewing a maliciously-crafted FLC movie may lead to an
application crash or arbitrary code execution
Description: By carefully crafting a corrupt FLC movie, an
attacker can trigger a heap buffer overflow which may lead to an
application crash or arbitrary code execution with the
privileges of the user. This update addresses the issue by
performing additional validation of FLC movies. Credit to Ruben
Santamarta of reversemode.com working with the iDefense VCP
Program, and Mike Price of McAfee AVERT Labs for reporting this
issue.QuickTime
CVE-ID: CVE-2006-4388
Available for: Mac OS X v10.3.9 and later, Windows XP/2000
Impact: Viewing a maliciously-crafted FlashPix may lead to an
application crash or arbitrary code execution
Description: By carefully crafting a corrupt FlashPix file, an
attacker can trigger an integer overflow or buffer overflow
which may lead to an application crash or arbitrary code
execution with the privileges of the user. This update addresses
the issue by performing additional validation of FlashPix files.
Credit to Mike Price of McAfee AVERT Labs for reporting this
issue.QuickTime
CVE-ID: CVE-2006-4389
Available for: Mac OS X v10.3.9 and later, Windows XP/2000
Impact: Viewing a maliciously-crafted FlashPix may lead to an
application crash or arbitrary code execution
Description: By carefully crafting a corrupt FlashPix file, an
attacker can trigger an exception leaving an uninitialized
object. This may lead to an application crash or arbitrary code
execution with the privileges of the user. This update addresses
the issue by performing additional validation of FlashPix files.
Credit to Mike Price of McAfee AVERT Labs for reporting this
issue.QuickTime
CVE-ID: CVE-2006-4385
Available for: Mac OS X v10.3.9 and later, Windows XP/2000
Impact: Viewing a maliciously-crafted SGI image may lead to an
application crash or arbitrary code execution
Description: By carefully crafting a corrupt SGI image, an
attacker can trigger a buffer overflow which may lead to an
application crash or arbitrary code execution with the
privileges of the user. This update addresses the issue by
performing additional validation of SGI image files. Credit to
Mike Price of McAfee AVERT Labs for reporting this issue.
最近のコメント