![]() ![]() ![]() For OS X Lion systems, this issue is addressed in OS X Lion v10.7.3. Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution - Description: An off by one buffer overflow existed in the handling of rdrf atoms in QuickTime movie files. ![]() CVE-2011-3458 : Luigi Auriemma and pa_kt both working with HP's Zero Day Initiative For Mac OS X v10.6 systems, this issue is addressed in Security Update 2012-001. Impact: Opening a maliciously crafted MP4 encoded file may lead to an unexpected application termination or arbitrary code execution - Description: An uninitialized memory access issue existed in the handling of MP4 encoded files.CVE-2012-0665 : Luigi Auriemma working with HP's Zero Day Initiative Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution - Description: A heap buffer overflow existed in the handling of H.264 encoded movie files.CVE-2012-0664 : Alexander Gavrun working with HP's Zero Day Initiative Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution - Description: A heap overflow existed in QuickTime's handling of text tracks.CVE-2012-0663 : Alexander Gavrun working with HP's Zero Day Initiative Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution - Description: Multiple stack overflows existed in QuickTime's handling of TeXML files. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |