Intrusion Prevention



This indicates an attack attempt against a Memory Corruption vulnerability in Apple QuickTime.
The vulnerability is caused by a lack of proper validation when parsing user supplied values that define the structure of an "FPX" file. It can be exploited to execute arbitrary code by enticing the user to open a malicious "FPX" file.

Affected Products

Apple Computer Quicktime prior to


System Compromise: Remote attackers can gain control of vulnerable systems.

Recommended Actions

Apply the most recent upgrade or patch from the vendor.

CVE References