Languages

Archived - About the security content of QuickTime 7.1.3

This article has been archived and is no longer updated by Apple.

This document describes the security content of QuickTime 7.1.3E, which can be downloaded and installed via Software Update preferences, or from Apple Downloads.

For the protection of our customers, Apple does not disclose, discuss, or confirm security issues until a full investigation has occurred and any necessary patches or releases are available. To learn more about Apple Product Security, see the Apple Product Security website.

For information about the Apple Product Security PGP Key, see "How to use the Apple Product Security PGP Key."

Where possible, CVE IDs are used to reference the vulnerabilities for further information.

To learn about other Security Updates, see "Apple Security Updates."

QuickTime 7.1.3 Update

  • QuickTime

    CVE-ID: CVE-2006-4381, CVE-2006-4386

    Available for: Mac OS X v10.3.9 and later, Windows XP/2000

    Impact: Viewing a maliciously-crafted H.264 movie may lead to an application crash or arbitrary code execution

    Description: By carefully crafting a corrupt H.264 movie, an attacker can trigger an integer overflow or buffer overflow which may lead to an application crash or arbitrary code execution with the privileges of the user. This update addresses the issue by performing additional validation of H.264 movies. Credit to Sowhat of Nevis Labs, Mike Price of McAfee AVERT Labs, and Piotr Bania for reporting these issues.

  • QuickTime

    CVE-ID: CVE-2006-4382

    Available for: Mac OS X v10.3.9 and later, Windows XP/2000

    Impact: Viewing a maliciously-crafted QuickTime movie may lead to an application crash or arbitrary code execution

    Description: By carefully crafting a corrupt QuickTime movie, an attacker can trigger a buffer overflow which may lead to an application crash or arbitrary code execution with the privileges of the user. This update addresses the issue by performing additional validation of QuickTime movies. Credit to Mike Price of McAfee AVERT Labs for reporting this issue.

  • QuickTime

    CVE-ID: CVE-2006-4384

    Available for: Mac OS X v10.3.9 and later, Windows XP/2000

    Impact: Viewing a maliciously-crafted FLC movie may lead to an application crash or arbitrary code execution

    Description: By carefully crafting a corrupt FLC movie, an attacker can trigger a heap buffer overflow which may lead to an application crash or arbitrary code execution with the privileges of the user. This update addresses the issue by performing additional validation of FLC movies. Credit to Ruben Santamarta of reversemode.com working with the iDefense VCP Program, and Mike Price of McAfee AVERT Labs for reporting this issue.

  • QuickTime

    CVE-ID: CVE-2006-4388

    Available for: Mac OS X v10.3.9 and later, Windows XP/2000

    Impact: Viewing a maliciously-crafted FlashPix may lead to an application crash or arbitrary code execution

    Description: By carefully crafting a corrupt FlashPix file, an attacker can trigger an integer overflow or buffer overflow which may lead to an application crash or arbitrary code execution with the privileges of the user. This update addresses the issue by performing additional validation of FlashPix files. Credit to Mike Price of McAfee AVERT Labs for reporting this issue.

  • QuickTime

    CVE-ID: CVE-2006-4389

    Available for: Mac OS X v10.3.9 and later, Windows XP/2000

    Impact: Viewing a maliciously-crafted FlashPix may lead to an application crash or arbitrary code execution

    Description: By carefully crafting a corrupt FlashPix file, an attacker can trigger an exception leaving an uninitialized object. This may lead to an application crash or arbitrary code execution with the privileges of the user. This update addresses the issue by performing additional validation of FlashPix files. Credit to Mike Price of McAfee AVERT Labs for reporting this issue.

  • QuickTime

    CVE-ID: CVE-2006-4385

    Available for: Mac OS X v10.3.9 and later, Windows XP/2000

    Impact: Viewing a maliciously-crafted SGI image may lead to an application crash or arbitrary code execution

    Description: By carefully crafting a corrupt SGI image, an attacker can trigger a buffer overflow which may lead to an application crash or arbitrary code execution with the privileges of the user. This update addresses the issue by performing additional validation of SGI image files. Credit to Mike Price of McAfee AVERT Labs for reporting this issue.

    • QuickTime

      CVE-ID: CVE-2007-0754

      Available for: Mac OS X v10.3.9 and later, Windows XP/2000

      Impact: Viewing a maliciously-crafted QuickTime movie may lead to an application crash or arbitrary code execution

      Description: By carefully crafting a corrupt QuickTime movie, an attacker can trigger a buffer overflow which may lead to an application crash or arbitrary code execution with the privileges of the user. This update addresses the issue by performing additional validation of QuickTime movies. Credit to Ganesh Devaraja of TippingPoint DVLabs for reporting this issue.

Last Modified: Feb 20, 2012
Print this page
  • Last Modified: Feb 20, 2012
  • Article: TA24355
  • Views:

    19468
  • Rating:
    • 70.0

    (8 Responses)

Additional Product Support Information