Vulnerability Note VU#200316

Apple QuickTime vulnerable to denial of service via specially crafted FlashPix file

Original Release date: 13 Sep 2006 | Last revised: 15 Sep 2006


A buffer overflow vulnerability in the way Apple QuickTime handles FlashPix files could allow a remote attacker to execute arbitrary code or cause a denial-of-service condition.


A buffer overflow vulnerability in QuickTime for Windows and Mac OS X may allow an attacker to execute arbitrary code with the privileges of the user running QuickTime. By convincing a user to open a specially-crafted FlashPix file, an attacker can trigger the overflow.

Depending on settings, a web browser could automatically open a FlashPix file with QuickTime. Apple iTunes includes QuickTime.


A remote, unauthenticated attacker can execute arbitrary code or create a denial-of-service condition.


Apple has addressed this issue in Quicktime 7.1.3. The latest version of QuickTime is available from the QuickTime download site.

Do not open multimedia files from untrusted sources
Do not open multimedia files that are from untrusted or unknown sources. For more information, please see Using Caution with Email Attachments.

Limit privileges
Running QuickTime with reduced privileges may help mitigate the effects of this vulnerability. Users with administrator access can run QuickTime with reduced privileges by following the instructions in Microsoft knowledgebase article 294676.

Run QuickTime with their regular user accounts. See the Before You Connect a New Computer to the Internet for more details.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Apple Computer, Inc.Affected-13 Sep 2006
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



Thanks to Apple Product Security for information about this vulnerability. Apple credits Mike Price of McAfee AVERT Labs.

This document was written by Ryan Giobbi.

Other Information

  • CVE IDs: CVE-2006-4388
  • Date Public: 12 Sep 2006
  • Date First Published: 13 Sep 2006
  • Date Last Updated: 15 Sep 2006
  • Severity Metric: 0.08
  • Document Revision: 17


If you have feedback, comments, or additional information about this vulnerability, please send us email.