Advertisement






Fortinet Advisory - Apple QuickTime Player ImageWidth Denial of Service Vulnerability

CVE Category Price Severity
CVE-2005-3710 CWE-Other $5000 High
Author Risk Exploitation Type Date
Fortinet High Remote 2006-01-28
CVSS EPSS EPSSP
CVSS:4.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H 0.23459 0.73456

CVSS vector description

Our sensors found this exploit at: http://cxsecurity.com/ascii/WLB-2006010035

Below is a copy:

Fortinet Security Advisory: FSA-2006-03

Apple QuickTime Player ImageWidth Denial of Service Vulnerability

Advisory Date      : January 12, 2006
Reported Date      : November 28, 2005
Vendor             : Apple computers
Affected Products  : Apple QuickTime Player v7.0.3
Severity           : Medium
Reference      : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3710
                 http://docs.info.apple.com/article.html?artnum=303101
                 http://www.securityfocus.com/bid/16202/info

Description        :  Fortinet Security Research Team (FSRT) has
discovered a Denial of Service Vulnerability in the Apple QuickTime
Player. Apple QuickTime has Denial of Service vulnerability in parsing the
specially crafted TIFF image files. This is due to application failure to
sanitize the parameter ImageWidth value while parsing TIFF image files. A
remote attacker could construct a web page with specially crafted tiff
file and entice a victim to view it, when the user opens the TIFF image
with Internet Explorer or Apple QuickTime Player, it'll cause memory
access violation, and leading to Denial of Service.

Impact             : Denial of Service

Solution           : Apple Computers has released a security update for
this vulnerability, which is available for downloading from Apples's web
site under security update.

Fortinet Protection: Fortinet is protecting network from this
vulnerability with latest IPS update.

Acknowledgment     : Dejun Meng of Fortinet Security Research team found
this vulnerability.

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum