{"vuid":"VU#914870","idnumber":"914870","name":"Apple QuickTime Streaming Server vulnerable to DoS","keywords":["Apple","QuickTime Streaming Server","DoS","denial of service"],"overview":"There is a vulnerability in the Apple QuickTime Streaming Server that could allow a remote attacker to cause a denial-of-service condition.","clean_desc":"Apple's QuickTime Streaming Server provides an integrated distribution mechanism for various forms of digital content. There is a vulnerability in the QuickTime Streaming Server that could allow a remote attacker to cause a denial-of-service condition. According to the Apple Security Advisory: A vulnerability in the QuickTime Streaming Server can be exploited by malicious people to cause a DoS (Denial of Service) via a particular sequence of client operations. This vulnerability affects Server versions only. The Apple Security Advisory does not specify the set of client operations used to trigger this vulnerability. In order to regain functionality, the server must be restarted.","impact":"A remote attacker could prevent legitimate users from accessing the streamed content.","resolution":"Apply Patch\nApple has released a patch to address this vulnerability in the Apple Security Update 2004-09-07.","workarounds":"","sysaffected":"","thanks":"This vulnerability was reported by Apple.","author":"This document was written by Damon Morda based on information provided by Apple.","public":["http://docs.info.apple.com/article.html?artnum=61798","http://secunia.com/advisories/12491/","http://www.securitytracker.com/alerts/2004/Sep/1011176.html","http://www.securityfocus.com/bid/11138"],"cveids":["CVE-2004-0825"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2004-09-08T13:07:26Z","publicdate":"2004-09-08T00:00:00Z","datefirstpublished":"2004-09-13T20:09:18Z","dateupdated":"2004-09-15T17:29:13Z","revision":12,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"7","cam_population":"7","cam_impact":"3","cam_easeofexploitation":"10","cam_attackeraccessrequired":"20","cam_scorecurrent":"1.7325","cam_scorecurrentwidelyknown":"2.12625","cam_scorecurrentwidelyknownexploited":"3.70125","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":1.7325,"vulnote":null}