Overview
Apple QuickTime fails to properly handle JPEG images. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary code or cause a denial of service condition.
Description
Apple's QuickTime Player is multimedia software that allows users to view local and remote audio, video, and image content. QuickTime contains an integer overflow in code that handles JPEG images. This vulnerability may be triggered by sending the QuickTime Player, or an application that uses the QuickTime plug-in, a specially crafted JPEG image file. |
Impact
A remote, unauthenticated attacker may be able to execute arbitrary code or cause a denial of service condition. |
Solution
Upgrade Apple has addressed this issue with QuickTime 7.1, as specified in Apple Support Document 303752. |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
This issue was reported in the Apple Support Document 303752.
This document was written by Jeff Gennari.
Other Information
CVE IDs: | CVE-2006-1458 |
Severity Metric: | 17.71 |
Date Public: | 2006-05-11 |
Date First Published: | 2006-05-12 |
Date Last Updated: | 2006-05-17 21:25 UTC |
Document Revision: | 33 |