2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2006-4389" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2006-09-12T23:07:00.000" ,
"lastModified" : "2018-10-17T21:36:55.430" ,
"vulnStatus" : "Modified" ,
"descriptions" : [
{
"lang" : "en" ,
"value" : "Apple QuickTime before 7.1.3 allows user-assisted remote attackers to execute arbitrary code via a crafted FlashPix (FPX) file, which triggers an exception that leads to an operation on an uninitialized object."
} ,
{
"lang" : "es" ,
"value" : "Apple QuickTime anterior 7.1.3 permite a un atacante con la complicidad de un usuario ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un fichero artesanal FlashPix (FPX), los cuales disparar\u00e1n una excepci\u00f3n que conduce a una operaci\u00f3n sobre un objeto no inicializado."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:H/Au:N/C:P/I:P/A:P" ,
"accessVector" : "NETWORK" ,
"accessComplexity" : "HIGH" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "PARTIAL" ,
"availabilityImpact" : "PARTIAL" ,
"baseScore" : 5.1
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 4.9 ,
"impactScore" : 6.4 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : true ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : true
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-Other"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apple:quicktime:5.0.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "844E1B14-A13A-47F1-9C82-02EAEED1A911"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apple:quicktime:6.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "80747BDD-70E9-4E74-896F-C79D014F1B2D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apple:quicktime:6.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EA1E140B-BCB4-4B3C-B287-E9E944E08DB0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apple:quicktime:6.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9C7CB5C4-9A5A-4831-8FFD-0D261619A7DE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apple:quicktime:6.5.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D2CE0B67-0794-472D-A2C0-CC5CA0E36370"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apple:quicktime:6.5.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3A5DDF47-5AA5-4EE3-B12D-9218F528EFE1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apple:quicktime:7.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F075BA0F-4A96-4F25-AF1D-C64C7DCE1CDC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apple:quicktime:7.0.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8692B488-129A-49EA-AF84-6077FCDBB898"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apple:quicktime:7.0.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1758610B-3789-489E-A751-386D605E5A08"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apple:quicktime:7.0.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B535737C-BF32-471C-B26A-588632FCC427"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apple:quicktime:7.0.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DF2C61F8-B376-40F9-8677-CADCC3295915"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apple:quicktime:7.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6254BB56-5A25-49DC-A851-3CCA249BD71D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apple:quicktime:7.1.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "795E3354-7824-4EF4-A788-3CFEB75734E4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apple:quicktime:7.1.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9419A1E9-A0DA-4846-8959-BE50B53736E5"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://docs.info.apple.com/article.html?artnum=304357" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://lists.apple.com/archives/Security-announce/2006/Sep/msg00000.html" ,
"source" : "cve@mitre.org"
} ,
2024-04-04 08:46:00 +00:00
{
"url" : "http://secunia.com/advisories/21893" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://secunia.com/advisories/29182" ,
"source" : "cve@mitre.org"
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://security.gentoo.org/glsa/glsa-200803-08.xml" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://securityreason.com/securityalert/1554" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://securitytracker.com/id?1016830" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.kb.cert.org/vuls/id/540348" ,
"source" : "cve@mitre.org" ,
"tags" : [
"US Government Resource"
]
} ,
2024-04-04 08:46:00 +00:00
{
"url" : "http://www.osvdb.org/28769" ,
"source" : "cve@mitre.org"
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://www.securityfocus.com/archive/1/445888/100/0/threaded" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.securityfocus.com/bid/19976" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Exploit" ,
"Patch"
]
} ,
{
"url" : "http://www.us-cert.gov/cas/techalerts/TA06-256A.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"US Government Resource"
]
} ,
{
"url" : "http://www.vupen.com/english/advisories/2006/3577" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/28938" ,
"source" : "cve@mitre.org"
}
]
}