Integer overflow in the AAC file parsing code in Apple iTunes before 6.0.5 on Mac OS X 10.2.8 or later, and Windows XP and 2000, allows remote user-assisted attackers to execute arbitrary code via an AAC (M4P, M4A, or M4B) file with a sample table size (STSZ) atom with a "malformed" sample_size_table value.
Weaknesses in this category are related to improper calculation or conversion of numbers.
Link | Tags |
---|---|
http://www.vupen.com/english/advisories/2006/2601 | vdb entry vendor advisory |
http://securitytracker.com/id?1016413 | vdb entry |
http://www.zerodayinitiative.com/advisories/ZDI-06-020.html | |
http://secunia.com/advisories/20891 | third party advisory patch vendor advisory |
http://www.kb.cert.org/vuls/id/907836 | us government resource third party advisory patch |
http://www.securityfocus.com/archive/1/438812/100/0/threaded | mailing list |
http://docs.info.apple.com/article.html?artnum=303952 | patch vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/27481 | vdb entry |
http://www.securityfocus.com/bid/18730 | vdb entry |