Vulnerability Note VU#683700

Apple QuickTime movie buffer overflow vulnerability

Original Release date: 13 Sep 2006 | Last revised: 13 Sep 2006


A buffer overflow vulnerability in the way Apple QuickTime handles movie files could allow a remote attacker to execute arbitrary code or cause a denial-of-service condition.


A buffer overflow vulnerability in QuickTime for Windows and Mac OS X may allow an attacker to execute arbitrary code with the privileges of the user running QuickTime. By convincing a user to open a specially-crafted QuickTime movie, an attacker can trigger the overflow.

Depending on settings, a web browser could automatically open a QuickTime movie. Apple iTunes includes QuickTime.


A remote, unauthenticated attacker can execute arbitrary code or create a denial-of-service condition.


Apple has addressed this issue in Quicktime 7.1.3. The latest version of QuickTime is availble from the QuickTime download site.

Do not open multimedia files from untrusted sources
Do not open multimedia files that are from untrusted or unknown sources. For more information, please see Using Caution with Email Attachments.

Limit privileges
Running QuickTime with reduced privileges may help mitigate the effects of this vulnerability. Users with administrator access can run QuickTime with reduced privileges by following the instructions in Microsoft knowledgebase article 294676.

Run QuickTime with their regular user accounts. See the Before You Connect a New Computer to the Internet for more details

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Apple Computer, Inc.Affected-13 Sep 2006
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



Thanks to Apple Product Security for information about this vulnerability. Apple credits Mike Price of McAfee AVERT Labs.

This document was written by Ryan Giobbi.

Other Information

  • CVE IDs: CVE-2006-4382
  • Date Public: 12 Sep 2006
  • Date First Published: 13 Sep 2006
  • Date Last Updated: 13 Sep 2006
  • Severity Metric: 2.73
  • Document Revision: 15


If you have feedback, comments, or additional information about this vulnerability, please send us email.