<<<
Date Index
>>>
<<<
Thread Index
>>>
Re: iDefense Security Advisory 07.11.07: Apple QuickTime SMIL File Processing Integer Overflow Vulnerability
To
:
bugtraq@xxxxxxxxxxxxxxxxx
Subject
: Re: iDefense Security Advisory 07.11.07: Apple QuickTime SMIL File Processing Integer Overflow Vulnerability
From
: Steve Shockley <
steve.shockley@xxxxxxxxxxxx
>
Date
: Tue, 17 Jul 2007 21:31:38 -0400
In-reply-to
: <
200707170013.l6H0Dvnt026433@xxxxxxxxxxxxxxxx
>
List-help
: <
mailto:bugtraq-help@securityfocus.com
>
List-id
: <bugtraq.list-id.securityfocus.com>
List-post
: <
mailto:bugtraq@securityfocus.com
>
List-subscribe
: <
mailto:bugtraq-subscribe@securityfocus.com
>
List-unsubscribe
: <
mailto:bugtraq-unsubscribe@securityfocus.com
>
Mailing-list
: contact
bugtraq-help@xxxxxxxxxxxxxxxxx
; run by ezmlm
References
: <
200707170013.l6H0Dvnt026433@xxxxxxxxxxxxxxxx
>
User-agent
: Mozilla/5.0 (Windows; U; Windows NT 6.0; en-US; rv:1.9a6pre) Gecko/20070604 Thunderbird/3.0a1pre Mnenhy/0.7.5.0
Dan Harkless wrote:
Windows 2000 users who need the ability to play QuickTime movies will have
I haven't tested this, but it's likely that editing the MSI file with
Orca or a similar utility to remove the version check will work just fine.
References
:
Re: iDefense Security Advisory 07.11.07: Apple QuickTime SMIL File Processing Integer Overflow Vulnerability
From:
Dan Harkless
Prev by Date:
Re: LFI On SMF 1.1.3
Next by Date:
Oracle Security: Insert / Update / Delete Data via Views
Previous by thread:
Re: iDefense Security Advisory 07.11.07: Apple QuickTime SMIL File Processing Integer Overflow Vulnerability
Next by thread:
FreeBSD Security Advisory FreeBSD-SA-07:05.libarchive
Index(es):
Date
Thread