Executive Summary

Informations
Name CVE-2006-4965 First vendor Publication 2006-09-24
Vendor Cve Last vendor Modification 2018-10-17

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:P/A:N)
Cvss Base Score 5 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Apple QuickTime 7.1.3 Player and Plug-In allows remote attackers to execute arbitrary JavaScript code and possibly conduct other attacks via a QuickTime Media Link (QTL) file with an embed XML element and a qtnext parameter that identifies resources outside of the original domain. NOTE: as of 20070912, this issue has been demonstrated by using instances of Components.interfaces.nsILocalFile and Components.interfaces.nsIProcess to execute arbitrary local files within Firefox and possibly Internet Explorer.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4965

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-94 Failure to Control Generation of Code ('Code Injection')

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1

OpenVAS Exploits

Date Description
2009-10-10 Name : SLES9: Security update for Mozilla
File : nvt/sles9p5018527.nasl
2009-01-28 Name : SuSE Update for MozillaFirefox,mozilla,seamonkey SUSE-SA:2007:057
File : nvt/gb_suse_2007_057.nasl
2008-09-04 Name : FreeBSD Ports: firefox
File : nvt/freebsd_firefox28.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
29064 Apple QuickTime Plug-In .qtl File qtnext Field XCS

Snort® IPS/IDS

Date Description
2014-01-10 Apple QuickTime Movie link file URI security bypass attempt
RuleID : 9430 - Revision : 14 - Type : FILE-MULTIMEDIA
2014-01-10 Apple QuickTime Movie link scripting security bypass attempt
RuleID : 9429 - Revision : 9 - Type : FILE-MULTIMEDIA
2014-01-10 Apple Quicktime Plug-In Security Bypass
RuleID : 17290 - Revision : 7 - Type : WEB-CLIENT

Nessus® Vulnerability Scanner

Date Description
2007-12-13 Name : The remote SuSE 10 host is missing a security-related patch.
File : suse_MozillaFirefox-4570.nasl - Type : ACT_GATHER_INFO
2007-10-26 Name : The remote openSUSE host is missing a security update.
File : suse_seamonkey-4596.nasl - Type : ACT_GATHER_INFO
2007-10-25 Name : The remote openSUSE host is missing a security update.
File : suse_seamonkey-4594.nasl - Type : ACT_GATHER_INFO
2007-10-24 Name : The remote openSUSE host is missing a security update.
File : suse_MozillaFirefox-4572.nasl - Type : ACT_GATHER_INFO
2007-10-24 Name : The remote openSUSE host is missing a security update.
File : suse_MozillaFirefox-4574.nasl - Type : ACT_GATHER_INFO
2007-09-24 Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_3ce8c7e266cf11dcb25f02e0185f8d72.nasl - Type : ACT_GATHER_INFO
2007-09-20 Name : The remote Windows host contains a web browser that may allow arbitrary code ...
File : mozilla_firefox_2007.nasl - Type : ACT_GATHER_INFO
2007-03-06 Name : The remote Windows host contains an application that is prone to multiple att...
File : quicktime_715.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
APPLE http://lists.apple.com/archives/Security-announce/2007/Mar/msg00000.html
BID http://www.securityfocus.com/bid/20138
BUGTRAQ http://www.securityfocus.com/archive/1/446750/100/0/threaded
http://www.securityfocus.com/archive/1/453756/100/0/threaded
http://www.securityfocus.com/archive/1/479179/100/0/threaded
CERT-VN http://www.kb.cert.org/vuls/id/751808
CONFIRM http://docs.info.apple.com/article.html?artnum=305149
MISC http://www.gnucitizen.org/blog/0day-quicktime-pwns-firefox
http://www.gnucitizen.org/blog/backdooring-mp3-files/
http://www.gnucitizen.org/blog/myspace-quicktime-worm-follow-up
SECTRACK http://www.securitytracker.com/id?1018687
SECUNIA http://secunia.com/advisories/22048
http://secunia.com/advisories/27414
SREASON http://securityreason.com/securityalert/1631
VUPEN http://www.vupen.com/english/advisories/2007/3155

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
Date Informations
2021-05-04 12:04:38
  • Multiple Updates
2021-04-22 01:05:17
  • Multiple Updates
2020-05-23 00:18:27
  • Multiple Updates
2018-10-18 00:19:43
  • Multiple Updates
2016-04-26 15:07:06
  • Multiple Updates
2014-02-17 10:37:22
  • Multiple Updates
2014-01-19 21:23:34
  • Multiple Updates
2013-05-11 11:10:09
  • Multiple Updates