First published: Mon Sep 16 2013(Updated: )
QuickTime in Apple Mac OS X before 10.8.5 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted idsc atom in a QuickTime movie file.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple QuickTime Player | ||
macOS Yosemite | <=10.8.4 | |
macOS Yosemite | =10.8.0 | |
macOS Yosemite | =10.8.1 | |
macOS Yosemite | =10.8.2 | |
macOS Yosemite | =10.8.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-1032 is categorized as a critical vulnerability that can allow remote attackers to execute arbitrary code or crash the application.
To fix CVE-2013-1032, upgrade QuickTime to the latest version or update your Mac OS X to 10.8.5 or later.
CVE-2013-1032 affects versions of Apple QuickTime prior to the patch and Mac OS X versions before 10.8.5.
CVE-2013-1032 can facilitate remote code execution and denial of service attacks through specially crafted QuickTime movie files.
There is no official workaround for CVE-2013-1032, but avoiding the opening of untrusted QuickTime files can reduce risk.