Integer overflow in the AAC file parsing code in Apple iTunes before 6.0.5 on Mac OS X 10.2.8 or later, and Windows XP and 2000, allows remote user-assisted attackers to execute arbitrary code via an AAC (M4P, M4A, or M4B) file with a sample table size (STSZ) atom with a "malformed" sample_size_table value.
                
            References
                    Configurations
                    History
                    21 Nov 2024, 00:08
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://docs.info.apple.com/article.html?artnum=303952 - Patch | |
| References | () http://secunia.com/advisories/20891 - Patch, Vendor Advisory | |
| References | () http://securitytracker.com/id?1016413 - | |
| References | () http://www.kb.cert.org/vuls/id/907836 - Patch, US Government Resource | |
| References | () http://www.securityfocus.com/archive/1/438812/100/0/threaded - | |
| References | () http://www.securityfocus.com/bid/18730 - | |
| References | () http://www.vupen.com/english/advisories/2006/2601 - Vendor Advisory | |
| References | () http://www.zerodayinitiative.com/advisories/ZDI-06-020.html - | |
| References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/27481 - | 
Information
                Published : 2006-06-29 23:05
Updated : 2025-04-03 01:03
NVD link : CVE-2006-1467
Mitre link : CVE-2006-1467
CVE.ORG link : CVE-2006-1467
JSON object : View
Products Affected
                apple
- itunes
CWE
                
                    
                        
                        CWE-189
                        
            Numeric Errors
