|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Windows >> Quicktime player buffer overflow Vulnerability Assessment Details
|
Quicktime player buffer overflow |
||
Checks the version of Quicktime Player Detailed Explanation for this Vulnerability Assessment The remote version of the Quicktime player is vulnerable to a buffer overflow. To exploit it, a possible hacker would need a user of this host to visit a rogue webpage with a malformed link in it. He could then be able to execute arbitrary code with the rights of the user visiting the page. Solution : Upgrade to Quicktime Player version 6.1 or later. Network Security Threat Level: High Networks Security ID: 7247 Vulnerability Assessment Copyright: This script is Copyright (C) 2003-2007 Tenable Network Security |
||
Cables, Connectors |
1U BareMetal pfsense opnsense Router Firewall DNS Server 6x 10GB Ethernet Ports
$149.00
PFSENSE 15" Depth Server Router Firewall Supermicro X11SSH-F E3-1240 V5 32GB RAM
$382.00
8x 240GB SSD 1U Rackmount Deduplication Compression Backup RAID Server X10DRW-iT
$499.00
1U Open Source Router Firewall X10SLH-N6-ST031 E3-1270 V3 6x 10GB Ethernet 16GB
$419.00
2 x HP ProLiant BL460c (447707-B21) Blade Servers No RAM No HDD
$30.00
Red Hat Enterprise Linux 5 Server - New and Sealed
$16.99
HP ProLiant BL460c Server Blade (2 x CPU) 24GB RAM/No Drives
$45.60
IBM E850 Power8 2x 12C 3.02GHz 512Gb 1.8Tb SAS 10GbE 16Gb Linux Server 8408-E8E
$674.96
Barracuda BBS490a / BNHW004 Backup Server No HDD with Power Cord
$249.99
Australia - Win/Linux Server- 2GB RAM, 1 Core,100 GB HD, Ultd Bandwidth 2 yrs
$196.76
|
||
No Discussions have been posted on this vulnerability. |