Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> MacOS X Local Security Checks >> Quicktime < 6.5.2


Vulnerability Assessment Details

Quicktime < 6.5.2

Vulnerability Assessment Summary
Check for Quicktime 6.5.2

Detailed Explanation for this Vulnerability Assessment

The remote Mac OS X host is running a version of Quicktime which is older
than Quicktime 6.5.2.

There is an integer overflow vulnerability in the remote version of this
software which may permit a possible hacker to execute arbitrary code on the remote
host. To exploit this flaw, a possible hacker would need to send a malformed
media file to a victim on the remote host, or set up a rogue web site and
lure a user on the remote host into visiting it.

Solution : http://docs.info.apple.com/article.html?artnum=61798
Network Security Threat Level: High

Networks Security ID: 11553

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

BlueArc Super MIcro Computer Inc. Super Server 5013G-M
$600.0
BlueArc Super MIcro Computer Inc. Super Server 5013G-M pictureLot of 2 HP Micro 8GB PC3L-10600R DDR3-1333MHz Server Memory HP 605313-071
$44.0
Lot of 2 HP Micro 8GB PC3L-10600R DDR3-1333MHz Server Memory HP 605313-071 pictureHP ProLiant G7 Dual-Core MicroServer 320 GB Hard Drive & 1.5 T HD
$139.5
HP ProLiant G7 Dual-Core MicroServer 320 GB Hard Drive & 1.5 T HD pictureSuper Micro X8DTi-F Server Motherboard and PAIR OF Xeon X5650s w/ I/O Shield
$160.0
Super Micro X8DTi-F Server Motherboard and PAIR OF Xeon X5650s w/ I/O Shield picture


Discussions

No Discussions have been posted on this vulnerability.