Vulnerability Description
Integer overflow in the quicktime_read_pascal function in libquicktime 1.2.4 and earlier allows remote attackers to cause a denial of service or possibly have other unspecified impact via a crafted hdlr MP4 atom.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Libquicktime | Libquicktime | <= 1.2.4 |
Related Weaknesses (CWE)
References
- http://www.debian.org/security/2017/dsa-3800
- http://www.nemux.org/2016/02/23/libquicktime-1-2-4/ExploitTechnical DescriptionThird Party Advisory
- http://www.securityfocus.com/bid/95880Third Party AdvisoryVDB Entry
- https://packetstormsecurity.com/files/135899/libquicktime-1.2.4-Integer-OverflowExploitThird Party AdvisoryVDB Entry
- https://www.exploit-db.com/exploits/39487/
- http://www.debian.org/security/2017/dsa-3800
- http://www.nemux.org/2016/02/23/libquicktime-1-2-4/ExploitTechnical DescriptionThird Party Advisory
- http://www.securityfocus.com/bid/95880Third Party AdvisoryVDB Entry
- https://packetstormsecurity.com/files/135899/libquicktime-1.2.4-Integer-OverflowExploitThird Party AdvisoryVDB Entry
- https://www.exploit-db.com/exploits/39487/
FAQ
What is CVE-2016-2399?
CVE-2016-2399 is a vulnerability with a CVSS score of 7.8 (HIGH). Integer overflow in the quicktime_read_pascal function in libquicktime 1.2.4 and earlier allows remote attackers to cause a denial of service or possibly have other unspecified impact via a crafted hd...
How severe is CVE-2016-2399?
CVE-2016-2399 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-2399?
Check the references section above for vendor advisories and patch information. Affected products include: Libquicktime Libquicktime.