1. Reverse Engineering >
  2. Exploits >
  3. Apple QuickTime up to 7.1.5 H.264 Movie Heap-based memory corruption


ArabicEnglishFrenchGermanGreekItalianJapaneseKoreanPersianPolishPortugueseRussianSpanishTurkishVietnamese

Apple QuickTime up to 7.1.5 H.264 Movie Heap-based memory corruption

RSS Kategorie Pfeil Exploits vom | Quelle: vuldb.com Direktlink öffnen

A vulnerability classified as critical was found in Apple QuickTime up to 7.1.5 (Multimedia Player Software). Affected by this vulnerability is some unknown functionality of the component H.264 Movie Handler. Upgrading to version 7.2 eliminates this vulnerability. Applying a patch is able to eliminate this problem. The bugfix is ready for download at docs.info.apple.com. The best possible mitigation is suggested to be upgrading to the latest version. A possible mitigation has been published before and not just after the disclosure of the vulnerability. Furthermore it is possible to detect and prevent this kind of attack with TippingPoint and the filter 12454....

Webseite öffnen Komplette Webseite öffnen

Newsbewertung

Kommentiere zu Apple QuickTime up to 7.1.5 H.264 Movie Heap-based memory corruption






Ähnliche Beiträge

  • 1. APPLE-SA-2016-02-25-1 Apple TV 7.2.1 vom 264.24 Punkte ic_school_black_18dp
    From: Apple Product SecurityReply to listAPPLE-SA-2016-02-25-1 Apple TV 7.2.1 Apple TV 7.2.1 is now available and addresses the following: bootp Available for: Apple TV (3rd Generation) Impact: A malicious Wi-Fi network may be able to determine netwo
  • 2. Apple QuickTime bis 7.7.8 Pufferüberlauf [CVE-2015-7086] vom 182.65 Punkte ic_school_black_18dp
    Allgemein scipID: 80120 Betroffen: Apple QuickTime bis 7.7.8 Veröffentlicht: 09.01.2016 Risiko: kritisch Erstellt: 10.01.2016 Aktualisiert: 11.01.2016 Eintrag: 66.8% komplett Beschreibung Eine kritische Schwachstelle wurde in Apple QuickTime bis 7.7.8 e
  • 3. Apple QuickTime bis 7.7.8 Pufferüberlauf [CVE-2015-7085] vom 182.65 Punkte ic_school_black_18dp
    Allgemein scipID: 80119 Betroffen: Apple QuickTime bis 7.7.8 Veröffentlicht: 09.01.2016 Risiko: kritisch Erstellt: 10.01.2016 Aktualisiert: 11.01.2016 Eintrag: 66.8% komplett Beschreibung In Apple QuickTime bis 7.7.8 wurde eine kritische Schwachstelle e
  • 4. The May 2019 Security Update Review vom 171.79 Punkte ic_school_black_18dp
    May is here and so are the scheduled security patches from Microsoft and Adobe. Take a break from your regularly scheduled activities and join us as we review the details for security patches for this month.   Adobe Patches for May 2019 This month, Ado
  • 5. Seeing Double: Exploiting a Blind Spot in MemGC vom 145.89 Punkte ic_school_black_18dp
    This is the first in our series of Top 5 interesting cases from 2018. Each of these bugs has some element that sets them apart from the approximately 1,400 advisories released by the program this year. We begin with a Pwn2Own winner exploiting Microso
  • 6. The February 2019 Security Update Review vom 140.77 Punkte ic_school_black_18dp
    February is here and with it comes the latest in security offerings from Adobe and Microsoft. Take a break from your regularly scheduled activities and join us as we review the details for security patches for this month. Adobe Patches for February 2019
  • 7. The February 2019 Security Update Review vom 140.77 Punkte ic_school_black_18dp
    February is here and with it comes the latest in security offerings from Adobe and Microsoft. Take a break from your regularly scheduled activities and join us as we review the details for security patches for this month. Adobe Patches for February 2019
  • 8. The June 2019 Security Update Review vom 135.28 Punkte ic_school_black_18dp
    June has arrived and so have the scheduled security patches from Microsoft and Adobe. Take a break from your regularly scheduled activities and join us as we review the details for security patches for this month. Adobe Patches for June 2019 This month, Ad
  • 9. Virtual machine memory allocation and placement on Azure Stack vom 132.89 Punkte ic_school_black_18dp
    Customers have been using Azure Stack in a number of different ways. We continue to see Azure Stack used in connected and disconnected scenarios, as a platform for building applications to deploy both on-premises as well as in Azure. Many customers wan
  • 10. Taking Control of VMware Through the Universal Host Control Interface: Part 2 vom 119.29 Punkte ic_school_black_18dp
    This blog looks at a winning Pwn2Own entry was provided by Abdulellah Alsaheel, our summer intern from Purdue University. This is the second blog reviewing this Pwn2Own winning exploit. You can read the first part of this series here. During this ye
  • 11. Android Studio 3.5 Beta vom 117.67 Punkte ic_school_black_18dp
    Posted by Jamal Eason, Product Manager, Android Android Studio 3.5 Beta is ready to download today. Last year, at Google I/O, we heard from many of you that you wanted us to focus even more on quality and stability over features. Consequently, we kicked off Project Marble, focused on making the fundamental features and flows of the Integrated Development Environment
  • 12. Android Studio 3.5 Beta vom 117.67 Punkte ic_school_black_18dp
    Posted by Jamal Eason, Product Manager, Android Android Studio 3.5 Beta is ready to download today. Last year, at Google I/O, we heard from many of you that you wanted us to focus even more on quality and stability over features. Consequently, we kicked off Project Marble, focused on making the fundamental features and flows of the Integrated Development Environment