Vulnerability Details : CVE-2006-4381
Potential exploit
Integer overflow in Apple QuickTime before 7.1.3 allows user-assisted remote attackers to execute arbitrary code via a crafted H.264 movie.
Vulnerability category: OverflowExecute code
Products affected by CVE-2006-4381
- cpe:2.3:a:apple:quicktime:*:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:5.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:5.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:5.0:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:6.0:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:6.1:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:6.5:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:6.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:6.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:6.5.2:*:mac_os_x_10.2:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:6.5.2:*:mac_os_x_10.3:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.0.1:*:mac_os_x_10.3:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.0:*:windows:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.0.1:*:mac_os_x_10.4:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.0.1:*:windows:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.0.2:*:windows:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.1.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2006-4381
8.82%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 92 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-4381
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.1
|
MEDIUM | AV:N/AC:H/Au:N/C:P/I:P/A:P |
4.9
|
6.4
|
NIST |
References for CVE-2006-4381
-
http://docs.info.apple.com/article.html?artnum=304357
-
http://www.osvdb.org/28774
-
http://securityreason.com/securityalert/1551
-
http://securitytracker.com/id?1016830
-
http://www.securityfocus.com/archive/1/445830/100/0/threaded
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/28928
-
http://www.vupen.com/english/advisories/2006/3577
-
http://secunia.com/advisories/21893
-
http://lists.apple.com/archives/Security-announce/2006/Sep/msg00000.html
Patch
-
http://www.securityfocus.com/bid/19976
Exploit;Patch
-
http://secway.org/advisory/AD20060912.txt
Exploit;Patch;Vendor Advisory
Jump to