Apple QuickTime before 7.1.3 allows user-assisted remote attackers to execute arbitrary code via a crafted FlashPix (FPX) file, which triggers an exception that leads to an operation on an uninitialized object.
Link | Tags |
---|---|
http://www.securityfocus.com/archive/1/445888/100/0/threaded | mailing list |
http://securitytracker.com/id?1016830 | vdb entry |
http://secunia.com/advisories/21893 | third party advisory |
http://www.securityfocus.com/bid/19976 | exploit vdb entry patch |
http://www.osvdb.org/28769 | vdb entry |
http://security.gentoo.org/glsa/glsa-200803-08.xml | vendor advisory |
http://securityreason.com/securityalert/1554 | third party advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/28938 | vdb entry |
http://www.us-cert.gov/cas/techalerts/TA06-256A.html | third party advisory us government resource |
http://docs.info.apple.com/article.html?artnum=304357 | |
http://www.kb.cert.org/vuls/id/540348 | third party advisory us government resource |
http://lists.apple.com/archives/Security-announce/2006/Sep/msg00000.html | vendor advisory |
http://www.vupen.com/english/advisories/2006/3577 | vdb entry |
http://secunia.com/advisories/29182 | third party advisory |