2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2006-4386" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2006-09-12T23:07:00.000" ,
"lastModified" : "2018-10-17T21:36:53.167" ,
"vulnStatus" : "Modified" ,
"evaluatorSolution" : "This vulnerability is addressed in the following product release:\r\nApple, QuickTime Player, 7.1.3" ,
"descriptions" : [
{
"lang" : "en" ,
"value" : "Integer overflow in Apple QuickTime before 7.1.3 allows user-assisted remote attackers to execute arbitrary code via a crafted H.264 movie, a different issue than CVE-2006-4381."
} ,
{
"lang" : "es" ,
"value" : "Desbordamiento de enteros en Apple QuickTime anterior a 7.1.3 permite a un atacante con la complicidad del usuario ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de una pel\u00edcula H.624 artesanal, una cuesti\u00f3n diferente a CVE-2006-4381."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:H/Au:N/C:P/I:P/A:P" ,
"accessVector" : "NETWORK" ,
"accessComplexity" : "HIGH" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "PARTIAL" ,
"availabilityImpact" : "PARTIAL" ,
"baseScore" : 5.1
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 4.9 ,
"impactScore" : 6.4 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : true ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : true
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-Other"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apple:quicktime:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "7.1.2" ,
"matchCriteriaId" : "6C66A47A-7A0A-4D11-9FE8-E42A07D6E18D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apple:quicktime:5.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "41473E1D-B988-4312-B16B-D340508DD473"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apple:quicktime:5.0.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FCC2EBC0-F2A6-4709-9A27-CF63BC578744"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apple:quicktime:5.0.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "844E1B14-A13A-47F1-9C82-02EAEED1A911"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apple:quicktime:6.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "80747BDD-70E9-4E74-896F-C79D014F1B2D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apple:quicktime:6.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EA1E140B-BCB4-4B3C-B287-E9E944E08DB0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apple:quicktime:6.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9C7CB5C4-9A5A-4831-8FFD-0D261619A7DE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apple:quicktime:6.5.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D2CE0B67-0794-472D-A2C0-CC5CA0E36370"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apple:quicktime:6.5.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3A5DDF47-5AA5-4EE3-B12D-9218F528EFE1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apple:quicktime:6.5.2:*:mac_os_x_10.2:*:*:*:*:*" ,
"matchCriteriaId" : "B821AA3F-98E4-4AF2-8E7F-52D5FF8F5000"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apple:quicktime:6.5.2:*:mac_os_x_10.3:*:*:*:*:*" ,
"matchCriteriaId" : "D8239EEC-A7FA-45FC-8AE8-793A1F46B34C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apple:quicktime:7.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F075BA0F-4A96-4F25-AF1D-C64C7DCE1CDC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apple:quicktime:7.0:*:windows:*:*:*:*:*" ,
"matchCriteriaId" : "BC1B46A6-E032-4E24-B367-F5A94E770FC5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apple:quicktime:7.0.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8692B488-129A-49EA-AF84-6077FCDBB898"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apple:quicktime:7.0.1:*:mac_os_x_10.3:*:*:*:*:*" ,
"matchCriteriaId" : "3195F233-6E2E-47CD-A882-4F01BECC40FE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apple:quicktime:7.0.1:*:mac_os_x_10.4:*:*:*:*:*" ,
"matchCriteriaId" : "CCD74F99-E8DD-4DF6-91AF-5AA443DB1921"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apple:quicktime:7.0.1:*:windows:*:*:*:*:*" ,
"matchCriteriaId" : "6E0B99DA-3BDA-4848-85BB-EC0D002A73F2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apple:quicktime:7.0.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1758610B-3789-489E-A751-386D605E5A08"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apple:quicktime:7.0.2:*:windows:*:*:*:*:*" ,
"matchCriteriaId" : "5EDE46EA-5B6A-4B59-8BAA-CD803F6D5FD8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apple:quicktime:7.0.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B535737C-BF32-471C-B26A-588632FCC427"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apple:quicktime:7.0.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DF2C61F8-B376-40F9-8677-CADCC3295915"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apple:quicktime:7.1.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "795E3354-7824-4EF4-A788-3CFEB75734E4"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://docs.info.apple.com/article.html?artnum=304357" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://lists.apple.com/archives/Security-announce/2006/Sep/msg00000.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "http://piotrbania.com/all/adv/quicktime-integer-overflow-h264-adv-7.1.txt" ,
"source" : "cve@mitre.org"
} ,
2024-04-04 08:46:00 +00:00
{
"url" : "http://secunia.com/advisories/21893" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://secunia.com/advisories/29182" ,
"source" : "cve@mitre.org"
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://security.gentoo.org/glsa/glsa-200803-08.xml" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://securityreason.com/securityalert/1550" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://securitytracker.com/id?1016830" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.kb.cert.org/vuls/id/554252" ,
"source" : "cve@mitre.org" ,
"tags" : [
"US Government Resource"
]
} ,
2024-04-04 08:46:00 +00:00
{
"url" : "http://www.osvdb.org/28773" ,
"source" : "cve@mitre.org"
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://www.securityfocus.com/archive/1/445823/100/0/threaded" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.securityfocus.com/archive/1/445888/100/0/threaded" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.securityfocus.com/bid/19976" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "http://www.us-cert.gov/cas/techalerts/TA06-256A.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"US Government Resource"
]
} ,
{
"url" : "http://www.vupen.com/english/advisories/2006/3577" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/28934" ,
"source" : "cve@mitre.org"
}
]
}