Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Windows >> Quicktime < 7.0.4 (Windows)


Vulnerability Assessment Details

Quicktime < 7.0.4 (Windows)

Vulnerability Assessment Summary
Checks for Quicktime < 7.0.4 on Windows

Detailed Explanation for this Vulnerability Assessment

Summary :

The remote version of QuickTime is affected by multiple code execution
vulnerabilities.

Description :

The remote Windows host is running a version of Quicktime prior to
7.0.4.

The remote version of Quicktime is vulnerable to various buffer
overflows involving specially-crafted image and media files. An
attacker may be able to leverage these issues to execute arbitrary
code on the remote host by sending a malformed file to a victim and
have him open it using QuickTime player.

See also :

http://lists.grok.org.uk/pipermail/full-disclosure/2006-January/041289.html
http://lists.grok.org.uk/pipermail/full-disclosure/2006-January/041290.html
http://lists.grok.org.uk/pipermail/full-disclosure/2006-January/041291.html
http://lists.grok.org.uk/pipermail/full-disclosure/2006-January/041292.html
http://lists.grok.org.uk/pipermail/full-disclosure/2006-January/041333.html
http://lists.grok.org.uk/pipermail/full-disclosure/2006-January/041334.html
http://lists.grok.org.uk/pipermail/full-disclosure/2006-January/041335.html
http://www.cirt.dk/advisories/cirt-41-advisory.pdf
http://lists.apple.com/archives/security-announce/2006/Jan/msg00001.html
http://docs.info.apple.com/article.html?artnum=303101

Solution :

Upgrade to Quicktime version 7.0.4 or later.

Network Security Threat Level:

High / CVSS Base Score : 7.0
(AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N)

Networks Security ID: 16202

Vulnerability Assessment Copyright: This script is Copyright (C) 2006-2007 Tenable Network Security

Cables, Connectors

RadiSys AMC-7211 Single MidSize Quad Gigabit Ethernet Module + SFP Transceivers
$49.99
RadiSys AMC-7211 Single MidSize Quad Gigabit Ethernet Module + SFP Transceivers pictureStarTech.com Gigabit Fiber SFP 550m Transceiver Module (Cisco GLC-LH-SMD Comp...
$94.13
StarTech.com Gigabit Fiber SFP 550m Transceiver Module (Cisco GLC-LH-SMD Comp... pictureSolarFlare SOLRQSFP2SFP3M Twin axial Direct Attach Cable
$77.95
SolarFlare SOLRQSFP2SFP3M Twin axial Direct Attach Cable pictureBrocade SFP+ Copper Cable - SFP+ Network - 3.28ft
$81.92
Brocade SFP+ Copper Cable - SFP+ Network - 3.28ft picture


Discussions

No Discussions have been posted on this vulnerability.