Vulnerability Details : CVE-2006-4384
Heap-based buffer overflow in Apple QuickTime before 7.1.3 allows user-assisted remote attackers to execute arbitrary code via the COLOR_64 chunk in a FLIC (FLC) movie.
Vulnerability category: OverflowExecute code
Exploit prediction scoring system (EPSS) score for CVE-2006-4384
Probability of exploitation activity in the next 30 days: 72.73%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 98 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2006-4384
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
5.1
|
MEDIUM | AV:N/AC:H/Au:N/C:P/I:P/A:P |
4.9
|
6.4
|
NIST |
References for CVE-2006-4384
-
http://www.securityfocus.com/archive/1/446134/100/0/threaded
- http://docs.info.apple.com/article.html?artnum=304357
- http://www.securityfocus.com/archive/1/445888/100/0/threaded
- http://security.gentoo.org/glsa/glsa-200803-08.xml
-
http://www.reversemode.com/index.php?option=com_remository&Itemid=2&func=fileinfo&id=25
- http://securitytracker.com/id?1016830
-
http://www.reversemode.com/index.php?option=com_remository&Itemid=2&func=fileinfo&id=24
- http://www.vupen.com/english/advisories/2006/3577
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/28930
- http://lists.apple.com/archives/Security-announce/2006/Sep/msg00000.html
- http://securityreason.com/securityalert/1554
-
http://www.securityfocus.com/bid/19976
Exploit;Patch
-
http://www.idefense.com/intelligence/vulnerabilities/display.php?id=413
Patch;Vendor Advisory
-
http://www.kb.cert.org/vuls/id/489836
US Government Resource
Products affected by CVE-2006-4384
- cpe:2.3:a:apple:quicktime:*:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:5.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:5.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:5.0:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:6.0:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:6.1:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:6.5:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:6.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:6.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:6.5.2:*:mac_os_x_10.2:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:6.5.2:*:mac_os_x_10.3:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.0.1:*:mac_os_x_10.3:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.0:*:windows:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.0.1:*:mac_os_x_10.4:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.0.1:*:windows:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.0.2:*:windows:*:*:*:*:*
- cpe:2.3:a:apple:quicktime:7.1.1:*:*:*:*:*:*:*