{"vuid":"VU#289705","idnumber":"289705","name":"Apple Quicktime JPEG integer overflow","keywords":["Apple","Quicktime","integer overflow","DoS","arbitrary code execution","JPEG","QuickTime_7.1"],"overview":"Apple QuickTime fails to properly handle JPEG images. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary code or cause a denial of service condition.","clean_desc":"Apple's QuickTime Player is multimedia software that allows users to view local and remote audio, video, and image content. QuickTime contains an integer overflow in code that handles JPEG images. This vulnerability may be triggered by sending the QuickTime Player, or an application that uses the QuickTime plug-in, a specially crafted JPEG image file. Note that this issue affects QuickTime installations on both Apple Mac and Windows operating systems.","impact":"A remote, unauthenticated attacker may be able to execute arbitrary code or cause a denial of service condition.","resolution":"Upgrade\nApple has addressed this issue with QuickTime 7.1, as specified in Apple Support Document 303752.","workarounds":"","sysaffected":"","thanks":"This issue was reported in  the \nApple Support Document 303752","author":"This document was written by Jeff Gennari.","public":["http://www.apple.com/support/downloads/quicktime71.html","http://docs.info.apple.com/article.html?artnum=303752"],"cveids":["CVE-2006-1458"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2006-05-12T15:23:39Z","publicdate":"2006-05-11T00:00:00Z","datefirstpublished":"2006-05-12T17:12:45Z","dateupdated":"2006-05-17T21:25:53Z","revision":33,"vrda_d1_directreport":"0","vrda_d1_population":"2","vrda_d1_impact":"3","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"15","cam_impact":"19","cam_easeofexploitation":"13","cam_attackeraccessrequired":"17","cam_scorecurrent":"17.71453125","cam_scorecurrentwidelyknown":"23.619375","cam_scorecurrentwidelyknownexploited":"47.23875","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":17.71453125,"vulnote":null}