|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Windows >> Quicktime player/plug-in Heap overflow Vulnerability Assessment Details
|
Quicktime player/plug-in Heap overflow |
||
Acertains the version of QuickTime Player/Plug-in Detailed Explanation for this Vulnerability Assessment The remote host is using QuickTime, a popular media player/Plug-in which handles many Media files. This version has a Heap overflow which may permit a possible hacker to execute arbitrary code on this host, with the rights of the user running QuickTime. More Info: http://eeye.com/html/Research/Advisories/AD20040502.html Solution : Uninstall this software or upgrade to version 6.5.1 or higher. Network Security Threat Level: High Networks Security ID: 10257 Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Jeff Adams |
||
Cables, Connectors |
Juniper EX4300-48T-AFO 48P 1GbE 2 PSU Switch
$279.00
Juniper (EX2200-C-12T-2G) 12 Port Managed Compact Switch
$75.00
Juniper Networks EX3400 48-Port 4-SFP PoE+ Running Junos P/N: EX3400-48P Tested
$399.99
Juniper EX2200-24P-4G 24 Port PoE Gigabit Switch SAME DAY SHIP 1 YEAR WARRANTY
$39.99
Juniper (EX2200-C-12P-2G) 12 Port Managed Compact Switch
$70.00
Juniper EX3300-24P Juniper 24 Port Gigabit PoE+ Switch - Same Day Shipping
$103.00
Juniper EX4300-48T 48 Port Gigabit 4 QSFP 40G Dual Power Supply Network Switch
$179.00
Juniper EX3400-48P 48-Ports 1GB PoE+ & 4-Ports SFP+ & 2-Ports QSFP+ & 1AC Switch
$299.95
JUNIPER EX4550-32F-AFO 32-PORT 1/10GbE SFP+ ETHERNET SWITCH Tested/Reset
$749.99
Juniper EX4300-48T 48-Ports Ethernet Switch w/Dual Power
$269.00
|
||
No Discussions have been posted on this vulnerability. |