製品・ソフトウェアに関する情報
Apple Quicktime に脆弱性
Title Apple Quicktime に脆弱性
Summary

Apple から Quicktime のアップデートが公開されました。

Possible impacts 細工された動画ファイルを閲覧することで、サービス運用妨害 (DoS) 攻撃を受けたり、任意のコードを実行されたりする可能性があります。
Solution

[アップデートする] Apple が提供する情報をもとにアップデートしてください。

Publication Date Aug. 13, 2010, midnight
Registration Date Sept. 6, 2010, 5:44 p.m.
Last Update Sept. 6, 2010, 5:44 p.m.
CVSS2.0 : 危険
Score 9.3
Vector AV:N/AC:M/Au:N/C:C/I:C/A:C
Affected System
アップル
QuickTime 7.6.7 より前のバージョン
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
その他
Change Log
No Changed Details Date of change
0 [2010年09月06日]
  掲載
Feb. 17, 2018, 10:37 a.m.

NVD Vulnerability Information
CVE-2010-1799
Summary

Stack-based buffer overflow in the error-logging functionality in Apple QuickTime before 7.6.7 on Windows allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted movie file.

Publication Date Aug. 17, 2010, 3:39 a.m.
Registration Date Jan. 29, 2021, 11:01 a.m.
Last Update Nov. 21, 2024, 10:15 a.m.
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:a:apple:quicktime:*:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:-:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:3.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:4.1.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:4.1.2:*:*:ja:*:*:*:*
cpe:2.3:a:apple:quicktime:4.1.2:*:*:*:*:windows:*:*
cpe:2.3:a:apple:quicktime:5.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:5.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:5.0.1:*:*:*:*:windows:*:*
cpe:2.3:a:apple:quicktime:5.0.2:*:*:*:*:windows:*:*
cpe:2.3:a:apple:quicktime:5.0.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:6.0:*:*:*:*:windows:*:*
cpe:2.3:a:apple:quicktime:6.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:6.0.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:6.0.0:*:*:*:*:windows:*:*
cpe:2.3:a:apple:quicktime:6.0.1:*:*:*:*:windows:*:*
cpe:2.3:a:apple:quicktime:6.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:6.0.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:6.0.2:*:*:*:*:windows:*:*
cpe:2.3:a:apple:quicktime:6.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:6.1.0:*:*:*:*:windows:*:*
cpe:2.3:a:apple:quicktime:6.1.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:6.1.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:6.1.1:*:*:*:*:windows:*:*
cpe:2.3:a:apple:quicktime:6.2.0:*:*:*:*:windows:*:*
cpe:2.3:a:apple:quicktime:6.2.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:6.3.0:*:*:*:*:windows:*:*
cpe:2.3:a:apple:quicktime:6.3.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:6.4.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:6.4.0:*:*:*:*:windows:*:*
cpe:2.3:a:apple:quicktime:6.5:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:6.5.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:6.5.0:*:*:*:*:windows:*:*
cpe:2.3:a:apple:quicktime:6.5.1:*:*:*:*:windows:*:*
cpe:2.3:a:apple:quicktime:6.5.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:6.5.2:*:*:*:*:windows:*:*
cpe:2.3:a:apple:quicktime:6.5.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.0:*:*:*:*:windows:*:*
cpe:2.3:a:apple:quicktime:7.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.0.0:*:*:*:*:windows:*:*
cpe:2.3:a:apple:quicktime:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.0.1:*:*:*:*:windows:*:*
cpe:2.3:a:apple:quicktime:7.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.0.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.0.2:*:*:*:*:windows:*:*
cpe:2.3:a:apple:quicktime:7.0.3:*:*:*:*:windows:*:*
cpe:2.3:a:apple:quicktime:7.0.3:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.0.4:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.0.4:*:*:*:*:windows:*:*
cpe:2.3:a:apple:quicktime:7.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.1.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.1.0:*:*:*:*:windows:*:*
cpe:2.3:a:apple:quicktime:7.1.1:*:*:*:*:windows:*:*
cpe:2.3:a:apple:quicktime:7.1.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.1.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.1.2:*:*:*:*:windows:*:*
cpe:2.3:a:apple:quicktime:7.1.3:*:*:*:*:windows:*:*
cpe:2.3:a:apple:quicktime:7.1.3:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.1.4:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.1.4:*:*:*:*:windows:*:*
cpe:2.3:a:apple:quicktime:7.1.5:*:*:*:*:windows:*:*
cpe:2.3:a:apple:quicktime:7.1.5:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.1.6:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.1.6:*:*:*:*:java:*:*
cpe:2.3:a:apple:quicktime:7.1.6:*:*:*:*:windows:*:*
cpe:2.3:a:apple:quicktime:7.2:*:windows_xp:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.2:*:windows_vista:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.2:*:windows_xp_sp2:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.2:*:vista:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.2:*:windows_sp_2:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.2.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.2.0:*:*:*:*:windows:*:*
cpe:2.3:a:apple:quicktime:7.2.1:*:*:*:*:windows:*:*
cpe:2.3:a:apple:quicktime:7.2.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.3:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.3.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.3.0:*:*:*:*:windows:*:*
cpe:2.3:a:apple:quicktime:7.3.1:*:*:*:*:windows:*:*
cpe:2.3:a:apple:quicktime:7.3.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.3.1.70:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.4:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.4.0:*:*:*:*:windows:*:*
cpe:2.3:a:apple:quicktime:7.4.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.4.1:*:*:*:*:windows:*:*
cpe:2.3:a:apple:quicktime:7.4.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.4.4:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.4.5:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.4.5:*:*:*:*:windows:*:*
cpe:2.3:a:apple:quicktime:7.5:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.5.0:*:*:*:*:windows:*:*
cpe:2.3:a:apple:quicktime:7.5.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.5.5:*:*:*:*:windows:*:*
cpe:2.3:a:apple:quicktime:7.5.5:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.6.0:*:*:*:*:windows:*:*
cpe:2.3:a:apple:quicktime:7.6.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.6.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.6.1:*:*:*:*:windows:*:*
cpe:2.3:a:apple:quicktime:7.6.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:quicktime:7.6.6:*:*:*:*:windows:*:*
execution environment
1 cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*
Related information, measures and tools
Common Vulnerabilities List