{"vuid":"VU#200316","idnumber":"200316","name":"Apple QuickTime vulnerable to denial of service via specially crafted FlashPix file","keywords":["Apple","QuickTime","DoS","denial of service","buffer overflow","FlashPix file"],"overview":"A buffer overflow vulnerability in the way Apple QuickTime handles FlashPix files could allow a remote attacker to execute arbitrary code or cause a denial-of-service condition.","clean_desc":"A buffer overflow vulnerability in QuickTime for Windows and Mac OS X may allow an attacker to execute arbitrary code with the privileges of the user running QuickTime. By convincing a user to open a specially-crafted FlashPix file, an attacker can trigger the overflow. Depending on settings, a web browser could automatically open a FlashPix file with QuickTime. Apple iTunes includes QuickTime.","impact":"A remote, unauthenticated attacker can execute arbitrary code or create a denial-of-service condition.","resolution":"Upgrade\nApple has addressed this issue in QuickTime 7.1.3. The latest version of QuickTime is available from the QuickTime download site.","workarounds":"Do not open multimedia files from untrusted sources\nDo not open multimedia files that are from untrusted or unknown sources. For more information, please see Using Caution with Email Attachments. Limit privileges\nRunning QuickTime with reduced privileges may help mitigate the effects of this vulnerability. Users with administrator access can run QuickTime with reduced privileges by following the instructions in Microsoft knowledgebase article 294676. Run QuickTime with their regular user accounts. See the Before You Connect a New Computer to the Internet for more details.","sysaffected":"","thanks":"Thanks to Apple Product Security for information about this vulnerability. Apple credits Mike Price of McAfee AVERT Labs.","author":"This document was written by Ryan Giobbi.","public":["http://secunia.com/advisories/21893/","http://www.us-cert.gov/cas/techalerts/TA06-256A.html","http://www.cert.org/tech_tips/before_you_plug_in.html","http://docs.info.apple.com/article.html?artnum=304357"],"cveids":["CVE-2006-4388"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2006-09-12T20:58:31Z","publicdate":"2006-09-12T00:00:00Z","datefirstpublished":"2006-09-13T18:17:54Z","dateupdated":"2006-09-15T19:58:19Z","revision":18,"vrda_d1_directreport":"0","vrda_d1_population":"2","vrda_d1_impact":"3","cam_widelyknown":"10","cam_exploitation":"0","cam_internetinfrastructure":"4","cam_population":"15","cam_impact":"5","cam_easeofexploitation":"2","cam_attackeraccessrequired":"2","cam_scorecurrent":"0.07875","cam_scorecurrentwidelyknown":"0.135","cam_scorecurrentwidelyknownexploited":"0.2475","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":0.07875,"vulnote":null}