Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> MacOS X Local Security Checks >> Quicktime < 6.5.2


Vulnerability Assessment Details

Quicktime < 6.5.2

Vulnerability Assessment Summary
Check for Quicktime 6.5.2

Detailed Explanation for this Vulnerability Assessment

The remote Mac OS X host is running a version of Quicktime which is older
than Quicktime 6.5.2.

There is an integer overflow vulnerability in the remote version of this
software which may permit a possible hacker to execute arbitrary code on the remote
host. To exploit this flaw, a possible hacker would need to send a malformed
media file to a victim on the remote host, or set up a rogue web site and
lure a user on the remote host into visiting it.

Solution : http://docs.info.apple.com/article.html?artnum=61798
Network Security Threat Level: High

Networks Security ID: 11553

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

E5-2690V3 INTEL XEON 2.60GHZ 30M 12 CORES 135W PROCESSOR SR1XN
$116.0
E5-2690V3 INTEL XEON 2.60GHZ 30M 12 CORES 135W PROCESSOR SR1XN pictureHP z420 Workstation Motherboard
$90.0
HP z420 Workstation Motherboard pictureIntel Xeon E5-1650 v3 3.50GHz SR20J 6 Core Server CPU
$106.0
Intel Xeon E5-1650 v3 3.50GHz SR20J 6 Core Server CPU pictureINTEL XEON W-2135 3.7GHz 8.25M 6 CORES 140W SR3LN CPU Processor
$278.0
INTEL XEON W-2135 3.7GHz 8.25M 6 CORES 140W SR3LN CPU Processor picture


Discussions

No Discussions have been posted on this vulnerability.