First published: Thu Dec 08 2005(Updated: )
Multiple heap-based buffer overflows in QuickTime.qts in Apple QuickTime Player 7.0.3 and iTunes 6.0.1 (3) and earlier allow remote attackers to cause a denial of service (crash) and execute arbitrary code via a .mov file with (1) a Movie Resource atom with a large size value, or (2) an stsd atom with a modified Sample Description Table size value, and possibly other vectors involving media files. NOTE: item 1 was originally identified by CVE-2005-4127 for a pre-patch announcement, and item 2 was originally identified by CVE-2005-4128 for a pre-patch announcement.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iTunes for Windows | =6.0.1 | |
Apple QuickTime | =7.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-4092 is considered a critical vulnerability due to its potential to cause remote code execution and denial of service.
To fix CVE-2005-4092, users should update to the latest version of Apple QuickTime Player and iTunes, which is 7.0.4 and 6.0.2 respectively.
The affected software versions for CVE-2005-4092 are Apple QuickTime Player 7.0.3 and Apple iTunes 6.0.1.
The impact of CVE-2005-4092 includes the possibility of application crashes and execution of arbitrary code through specially crafted .mov files.
Yes, CVE-2005-4092 can be exploited remotely via malicious .mov files sent to users.