2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2006-1453" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2006-05-12T20:06:00.000" ,
2025-04-03 02:06:18 +00:00
"lastModified" : "2025-04-03T01:03:51.193" ,
"vulnStatus" : "Deferred" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Stack-based buffer overflow in Apple QuickTime before 7.1 allows remote attackers to execute arbitrary code via a crafted QuickDraw PICT image format file containing malformed font information."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:H/Au:N/C:P/I:P/A:P" ,
2024-11-22 03:16:05 +00:00
"baseScore" : 5.1 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "HIGH" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "PARTIAL" ,
2024-11-22 03:16:05 +00:00
"availabilityImpact" : "PARTIAL"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 4.9 ,
"impactScore" : 6.4 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : true ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : true
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-119"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apple:quicktime:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "7.0.4" ,
"matchCriteriaId" : "EEAFBED2-7F11-42F2-ADAF-14998633BE4B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apple:quicktime:3.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D8F310A8-F760-4059-987D-42369F360DE4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apple:quicktime:4.1.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F71BC599-FCBE-4F1F-AA24-41AF91F82226"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apple:quicktime:5.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "41473E1D-B988-4312-B16B-D340508DD473"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apple:quicktime:5.0.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FCC2EBC0-F2A6-4709-9A27-CF63BC578744"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apple:quicktime:6.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "80747BDD-70E9-4E74-896F-C79D014F1B2D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apple:quicktime:6.0.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "85ADED98-62C6-4961-894C-1D26E3B3EE5E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apple:quicktime:6.0.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F522CEA4-B3BB-4C94-B070-6679EEA43439"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apple:quicktime:6.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EA1E140B-BCB4-4B3C-B287-E9E944E08DB0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apple:quicktime:6.1.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0B630944-F838-4C02-90D4-F5EB2A073CA2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apple:quicktime:6.1.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9066C81B-A69F-450D-8606-5E29AF1AD286"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apple:quicktime:6.2.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "71285AD2-3966-4817-B630-8335BE985D56"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apple:quicktime:6.3.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2458480E-F222-452A-AB21-933F924F8F6F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apple:quicktime:6.4.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "30C83A78-6BB9-443E-B508-CC6F8D157A6E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apple:quicktime:6.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9C7CB5C4-9A5A-4831-8FFD-0D261619A7DE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apple:quicktime:6.5.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "61463F4F-BBE0-42AA-AC22-8F39E94EB520"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apple:quicktime:6.5.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D2CE0B67-0794-472D-A2C0-CC5CA0E36370"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apple:quicktime:6.5.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3A5DDF47-5AA5-4EE3-B12D-9218F528EFE1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apple:quicktime:7.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F075BA0F-4A96-4F25-AF1D-C64C7DCE1CDC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apple:quicktime:7.0.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F43E39C4-6A08-4C38-BC7D-573F40978527"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apple:quicktime:7.0.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8692B488-129A-49EA-AF84-6077FCDBB898"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apple:quicktime:7.0.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1758610B-3789-489E-A751-386D605E5A08"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apple:quicktime:7.0.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B535737C-BF32-471C-B26A-588632FCC427"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://lists.apple.com/archives/security-announce/2006/May/msg00002.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://lists.apple.com/archives/security-announce/2006/May/msg00003.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
2024-04-04 08:46:00 +00:00
{
"url" : "http://secunia.com/advisories/20069" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/20077" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://securityreason.com/securityalert/887" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://securitytracker.com/id?1016067" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "http://securitytracker.com/id?1016075" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "http://www.securityfocus.com/archive/1/433831/100/0/threaded" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.securityfocus.com/bid/17951" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "http://www.securityfocus.com/bid/17953" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "http://www.us-cert.gov/cas/techalerts/TA06-132A.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch" ,
"Third Party Advisory" ,
"US Government Resource"
]
} ,
{
"url" : "http://www.us-cert.gov/cas/techalerts/TA06-132B.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"US Government Resource"
]
} ,
{
"url" : "http://www.vupen.com/english/advisories/2006/1778" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://www.vupen.com/english/advisories/2006/1779" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26400" ,
"source" : "cve@mitre.org"
2024-11-22 03:16:05 +00:00
} ,
{
"url" : "http://lists.apple.com/archives/security-announce/2006/May/msg00002.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://lists.apple.com/archives/security-announce/2006/May/msg00003.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/20069" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/20077" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://securityreason.com/securityalert/887" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://securitytracker.com/id?1016067" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "http://securitytracker.com/id?1016075" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "http://www.securityfocus.com/archive/1/433831/100/0/threaded" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.securityfocus.com/bid/17951" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "http://www.securityfocus.com/bid/17953" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "http://www.us-cert.gov/cas/techalerts/TA06-132A.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch" ,
"Third Party Advisory" ,
"US Government Resource"
]
} ,
{
"url" : "http://www.us-cert.gov/cas/techalerts/TA06-132B.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"US Government Resource"
]
} ,
{
"url" : "http://www.vupen.com/english/advisories/2006/1778" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://www.vupen.com/english/advisories/2006/1779" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/26400" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
2023-04-24 12:24:31 +02:00
}
]
}