Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> MacOS X Local Security Checks >> Quicktime < 6.5.2


Vulnerability Assessment Details

Quicktime < 6.5.2

Vulnerability Assessment Summary
Check for Quicktime 6.5.2

Detailed Explanation for this Vulnerability Assessment

The remote Mac OS X host is running a version of Quicktime which is older
than Quicktime 6.5.2.

There is an integer overflow vulnerability in the remote version of this
software which may permit a possible hacker to execute arbitrary code on the remote
host. To exploit this flaw, a possible hacker would need to send a malformed
media file to a victim on the remote host, or set up a rogue web site and
lure a user on the remote host into visiting it.

Solution : http://docs.info.apple.com/article.html?artnum=61798
Network Security Threat Level: High

Networks Security ID: 11553

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

IBM 46C7576 46C7577 8GB HYMP31GF72CMP4D5-Y5 DDR2 Memory Module Blade Server HS21
$7.0
IBM 46C7576 46C7577 8GB HYMP31GF72CMP4D5-Y5 DDR2 Memory Module Blade Server HS21 pictureIBM Blade Server HS21 8853AC1 with Memory IO Expansion Blade
$112.18
IBM Blade Server HS21 8853AC1 with Memory IO Expansion Blade pictureHP PROLIANT WS460C G8 SERVER TWO E5-2690V2 3.0GHZ 192GB 2 X 300GB 10K SAS
$3029.0
HP PROLIANT WS460C G8 SERVER TWO E5-2690V2 3.0GHZ 192GB 2 X 300GB 10K SAS pictureDell PowerEdge M630 Blade Server 2x 8-Core E5-2667v3 3.2GHz 512GB Ram 2x 1.2TB
$7519.49
Dell PowerEdge M630 Blade Server 2x 8-Core E5-2667v3 3.2GHz 512GB Ram 2x 1.2TB picture


Discussions

No Discussions have been posted on this vulnerability.