{"vuid":"VU#683700","idnumber":"683700","name":"Apple QuickTime movie buffer overflow vulnerability","keywords":["Apple","QuickTime","DoS","denial of service","buffer overflow","QuickTime movie","QuickTime_713"],"overview":"A buffer overflow vulnerability in the way Apple QuickTime handles movie files could allow a remote attacker to execute arbitrary code or cause a denial-of-service condition.","clean_desc":"A buffer overflow vulnerability in QuickTime for Windows and Mac OS X may allow an attacker to execute arbitrary code with the privileges of the user running QuickTime. By convincing a user to open a specially-crafted QuickTime movie, an attacker can trigger the overflow. Depending on settings, a web browser could automatically open a QuickTime movie. Apple iTunes includes QuickTime.","impact":"A remote, unauthenticated attacker can execute arbitrary code or create a denial-of-service condition.","resolution":"Upgrade\nApple has addressed this issue in Quicktime 7.1.3. The latest version of QuickTime is availble from the QuickTime download site.","workarounds":"Do not open multimedia files from untrusted sources\nDo not open multimedia files that are from untrusted or unknown sources. For more information, please see Using Caution with Email Attachments. Limit privileges\nRunning QuickTime with reduced privileges may help mitigate the effects of this vulnerability. Users with administrator access can run QuickTime with reduced privileges by following the instructions in Microsoft knowledgebase article 294676. Run QuickTime with their regular user accounts. See the Before You Connect a New Computer to the Internet for more details","sysaffected":"","thanks":"Thanks to Apple Product Security for information about this vulnerability. Apple credits Mike Price of McAfee AVERT Labs.","author":"This document was written by Ryan Giobbi.","public":["http://docs.info.apple.com/article.html?artnum=304357","http://www.apple.com/quicktime/download/","http://secunia.com/advisories/21893/"],"cveids":["CVE-2006-4382"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2006-09-12T20:52:28Z","publicdate":"2006-09-12T00:00:00Z","datefirstpublished":"2006-09-13T16:01:42Z","dateupdated":"2006-09-13T16:26:38Z","revision":15,"vrda_d1_directreport":"0","vrda_d1_population":"2","vrda_d1_impact":"3","cam_widelyknown":"9","cam_exploitation":"0","cam_internetinfrastructure":"3","cam_population":"18","cam_impact":"9","cam_easeofexploitation":"5","cam_attackeraccessrequired":"15","cam_scorecurrent":"2.73375","cam_scorecurrentwidelyknown":"5.2396875","cam_scorecurrentwidelyknownexploited":"9.7959375","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":2.73375,"vulnote":null}