First published: Fri Jun 24 2011(Updated: )
Buffer overflow in QuickTime in Apple Mac OS X before 10.6.8 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted JPEG file.
Credit: product-security@apple.com product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple QuickTime Player | ||
macOS Yosemite | =10.6.0 | |
macOS Yosemite | =10.6.1 | |
macOS Yosemite | =10.6.2 | |
macOS Yosemite | =10.6.3 | |
macOS Yosemite | =10.6.4 | |
macOS Yosemite | =10.6.5 | |
macOS Yosemite | =10.6.6 | |
macOS Yosemite | =10.6.7 | |
Apple Mac OS X Server | =10.6.0 | |
Apple Mac OS X Server | =10.6.1 | |
Apple Mac OS X Server | =10.6.2 | |
Apple Mac OS X Server | =10.6.3 | |
Apple Mac OS X Server | =10.6.4 | |
Apple Mac OS X Server | =10.6.5 | |
Apple Mac OS X Server | =10.6.6 | |
Apple Mac OS X Server | =10.6.7 | |
Apple QuickTime Player | ||
Apple QuickTime Player |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-0213 is considered a high-severity vulnerability due to its potential for remote code execution.
To fix CVE-2011-0213, you should update QuickTime or macOS to the latest version that contains the security patch.
CVE-2011-0213 can be exploited through specially crafted JPEG files that may lead to arbitrary code execution or a denial of service.
CVE-2011-0213 affects QuickTime on macOS versions prior to 10.6.8.
No, users running macOS 10.6.8 or later are not at risk from CVE-2011-0213 as it has been patched.