VAR-200703-0018
Vulnerability from variot - Updated: 2026-03-09 22:23Integer overflow in Apple QuickTime before 7.1.5 allows remote user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted QTIF file. The Apple QuickTime player contains a heap buffer overflow vulnerability. This vulnerability may allow an attacker to execute arbitrary code or create a denial-of-service condition. Apple QuickTime is prone to multiple unspecified remote code-execution vulnerabilities including mulitple heap and stack-based buffer-overflow and integer-overflow issues. These issues arise when the application handles specially crafted 3GP, MIDI, MOV, PICT, and QTIF files. Successful attacks can result in the compromise of the applicaiton or can cause denial-of-service conditions. Few details regarding these issues are currently available. Separate BIDs for each issue will be created as new information becomes available. QuickTime versions prior to 7.1.5 are vulnerable. Apple QuickTime is a popular multimedia player that supports a wide variety of media formats. There are multiple buffer overflow vulnerabilities in QuickTime's processing of various media formats. Remote attackers may exploit these vulnerabilities to control the user's machine by enticing the user to open and process malformed media files. There was an integer overflow in QuickTime's handling of QTIF files. (CVE-2007-0717)
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-200703-0018",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": null,
"scope": null,
"trust": 6.4,
"vendor": "apple computer",
"version": null
},
{
"model": "quicktime",
"scope": "eq",
"trust": 1.6,
"vendor": "apple",
"version": "7.1.1"
},
{
"model": "quicktime",
"scope": "eq",
"trust": 1.6,
"vendor": "apple",
"version": "7.0.4"
},
{
"model": "quicktime",
"scope": "eq",
"trust": 1.6,
"vendor": "apple",
"version": "7.1.2"
},
{
"model": "quicktime",
"scope": "eq",
"trust": 1.6,
"vendor": "apple",
"version": "7.1"
},
{
"model": "quicktime",
"scope": "eq",
"trust": 1.6,
"vendor": "apple",
"version": "7.1.4"
},
{
"model": "quicktime",
"scope": "eq",
"trust": 1.6,
"vendor": "apple",
"version": "7.0.1"
},
{
"model": "quicktime",
"scope": "eq",
"trust": 1.6,
"vendor": "apple",
"version": "7.0.2"
},
{
"model": "quicktime",
"scope": "eq",
"trust": 1.6,
"vendor": "apple",
"version": "7.0.3"
},
{
"model": "quicktime",
"scope": "eq",
"trust": 1.6,
"vendor": "apple",
"version": "7.1.3"
},
{
"model": "quicktime",
"scope": "eq",
"trust": 1.6,
"vendor": "apple",
"version": "7.0"
},
{
"model": "quicktime",
"scope": "lte",
"trust": 0.8,
"vendor": "apple",
"version": "7.1.4"
},
{
"model": "quicktime player",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "7.1.4"
},
{
"model": "quicktime player",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "7.1.3"
},
{
"model": "quicktime player",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "7.1.2"
},
{
"model": "quicktime player",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "7.1.1"
},
{
"model": "quicktime player",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "7.0.4"
},
{
"model": "quicktime player",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "7.0.3"
},
{
"model": "quicktime player",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "7.0.2"
},
{
"model": "quicktime player",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "7.0.1"
},
{
"model": "quicktime player",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "7.0"
},
{
"model": "quicktime player",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "6.5.2"
},
{
"model": "quicktime player",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "6.5.1"
},
{
"model": "quicktime player",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "6.5"
},
{
"model": "quicktime player",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "6.1"
},
{
"model": "quicktime player",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "5.0.2"
},
{
"model": "quicktime player",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "7.1"
},
{
"model": "quicktime player",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "6"
},
{
"model": "quicktime player",
"scope": "ne",
"trust": 0.3,
"vendor": "apple",
"version": "7.1.5"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#568689"
},
{
"db": "CERT/CC",
"id": "VU#880561"
},
{
"db": "CERT/CC",
"id": "VU#822481"
},
{
"db": "CERT/CC",
"id": "VU#861817"
},
{
"db": "CERT/CC",
"id": "VU#448745"
},
{
"db": "CERT/CC",
"id": "VU#313225"
},
{
"db": "CERT/CC",
"id": "VU#410993"
},
{
"db": "CERT/CC",
"id": "VU#642433"
},
{
"db": "BID",
"id": "22827"
},
{
"db": "CNNVD",
"id": "CNNVD-200703-174"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-000197"
},
{
"db": "NVD",
"id": "CVE-2007-0717"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:apple:quicktime",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2007-000197"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "JJ Reyes\nMike Price\niotr Bania\nArtur Ogloza\nPiotr Bania\u203b bania.piotr@gmail.com\u203bSowhat\u203b smaillist@gmail.com\u203bhttp://www.zerodayinitiative.com/",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200703-174"
}
],
"trust": 0.6
},
"cve": "CVE-2007-0717",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"id": "CVE-2007-0717",
"impactScore": 4.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"id": "VHN-24079",
"impactScore": 4.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2007-0717",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "CARNEGIE MELLON",
"id": "VU#568689",
"trust": 0.8,
"value": "16.20"
},
{
"author": "CARNEGIE MELLON",
"id": "VU#880561",
"trust": 0.8,
"value": "6.64"
},
{
"author": "CARNEGIE MELLON",
"id": "VU#822481",
"trust": 0.8,
"value": "9.00"
},
{
"author": "CARNEGIE MELLON",
"id": "VU#861817",
"trust": 0.8,
"value": "17.36"
},
{
"author": "CARNEGIE MELLON",
"id": "VU#448745",
"trust": 0.8,
"value": "4.81"
},
{
"author": "CARNEGIE MELLON",
"id": "VU#313225",
"trust": 0.8,
"value": "17.72"
},
{
"author": "CARNEGIE MELLON",
"id": "VU#410993",
"trust": 0.8,
"value": "16.20"
},
{
"author": "CARNEGIE MELLON",
"id": "VU#642433",
"trust": 0.8,
"value": "16.20"
},
{
"author": "NVD",
"id": "CVE-2007-0717",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNNVD",
"id": "CNNVD-200703-174",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-24079",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#568689"
},
{
"db": "CERT/CC",
"id": "VU#880561"
},
{
"db": "CERT/CC",
"id": "VU#822481"
},
{
"db": "CERT/CC",
"id": "VU#861817"
},
{
"db": "CERT/CC",
"id": "VU#448745"
},
{
"db": "CERT/CC",
"id": "VU#313225"
},
{
"db": "CERT/CC",
"id": "VU#410993"
},
{
"db": "CERT/CC",
"id": "VU#642433"
},
{
"db": "VULHUB",
"id": "VHN-24079"
},
{
"db": "CNNVD",
"id": "CNNVD-200703-174"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-000197"
},
{
"db": "NVD",
"id": "CVE-2007-0717"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Integer overflow in Apple QuickTime before 7.1.5 allows remote user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted QTIF file. The Apple QuickTime player contains a heap buffer overflow vulnerability. This vulnerability may allow an attacker to execute arbitrary code or create a denial-of-service condition. Apple QuickTime is prone to multiple unspecified remote code-execution vulnerabilities including mulitple heap and stack-based buffer-overflow and integer-overflow issues. \nThese issues arise when the application handles specially crafted 3GP, MIDI, MOV, PICT, and QTIF files. Successful attacks can result in the compromise of the applicaiton or can cause denial-of-service conditions. \nFew details regarding these issues are currently available. Separate BIDs for each issue will be created as new information becomes available. \nQuickTime versions prior to 7.1.5 are vulnerable. Apple QuickTime is a popular multimedia player that supports a wide variety of media formats. There are multiple buffer overflow vulnerabilities in QuickTime\u0027s processing of various media formats. Remote attackers may exploit these vulnerabilities to control the user\u0027s machine by enticing the user to open and process malformed media files. There was an integer overflow in QuickTime\u0027s handling of QTIF files. (CVE-2007-0717)",
"sources": [
{
"db": "NVD",
"id": "CVE-2007-0717"
},
{
"db": "CERT/CC",
"id": "VU#568689"
},
{
"db": "CERT/CC",
"id": "VU#880561"
},
{
"db": "CERT/CC",
"id": "VU#822481"
},
{
"db": "CERT/CC",
"id": "VU#861817"
},
{
"db": "CERT/CC",
"id": "VU#448745"
},
{
"db": "CERT/CC",
"id": "VU#313225"
},
{
"db": "CERT/CC",
"id": "VU#410993"
},
{
"db": "CERT/CC",
"id": "VU#642433"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-000197"
},
{
"db": "BID",
"id": "22827"
},
{
"db": "VULHUB",
"id": "VHN-24079"
}
],
"trust": 7.74
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "BID",
"id": "22827",
"trust": 9.2
},
{
"db": "SECUNIA",
"id": "24359",
"trust": 8.9
},
{
"db": "SECTRACK",
"id": "1017725",
"trust": 8.1
},
{
"db": "AUSCERT",
"id": "AL-2007.0031",
"trust": 6.4
},
{
"db": "CERT/CC",
"id": "VU#410993",
"trust": 3.6
},
{
"db": "NVD",
"id": "CVE-2007-0717",
"trust": 2.8
},
{
"db": "USCERT",
"id": "TA07-065A",
"trust": 2.8
},
{
"db": "VUPEN",
"id": "ADV-2007-0825",
"trust": 1.7
},
{
"db": "OSVDB",
"id": "33899",
"trust": 1.7
},
{
"db": "XF",
"id": "32823",
"trust": 1.4
},
{
"db": "CERT/CC",
"id": "VU#568689",
"trust": 1.1
},
{
"db": "CERT/CC",
"id": "VU#880561",
"trust": 1.1
},
{
"db": "CERT/CC",
"id": "VU#822481",
"trust": 1.1
},
{
"db": "CERT/CC",
"id": "VU#861817",
"trust": 1.1
},
{
"db": "CERT/CC",
"id": "VU#448745",
"trust": 1.1
},
{
"db": "CERT/CC",
"id": "VU#313225",
"trust": 1.1
},
{
"db": "CERT/CC",
"id": "VU#642433",
"trust": 1.1
},
{
"db": "BID",
"id": "22843",
"trust": 0.8
},
{
"db": "BID",
"id": "22844",
"trust": 0.8
},
{
"db": "ZDI",
"id": "ZDI-07-010",
"trust": 0.8
},
{
"db": "USCERT",
"id": "SA07-065A",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2007-000197",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-200703-174",
"trust": 0.7
},
{
"db": "CERT/CC",
"id": "TA07-065A",
"trust": 0.6
},
{
"db": "APPLE",
"id": "APPLE-SA-2007-03-05",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-24079",
"trust": 0.1
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#568689"
},
{
"db": "CERT/CC",
"id": "VU#880561"
},
{
"db": "CERT/CC",
"id": "VU#822481"
},
{
"db": "CERT/CC",
"id": "VU#861817"
},
{
"db": "CERT/CC",
"id": "VU#448745"
},
{
"db": "CERT/CC",
"id": "VU#313225"
},
{
"db": "CERT/CC",
"id": "VU#410993"
},
{
"db": "CERT/CC",
"id": "VU#642433"
},
{
"db": "VULHUB",
"id": "VHN-24079"
},
{
"db": "BID",
"id": "22827"
},
{
"db": "CNNVD",
"id": "CNNVD-200703-174"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-000197"
},
{
"db": "NVD",
"id": "CVE-2007-0717"
}
]
},
"id": "VAR-200703-0018",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-24079"
}
],
"trust": 0.01
},
"last_update_date": "2026-03-09T22:23:52.792000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "QuickTime 7.1.5 for Mac",
"trust": 0.8,
"url": "http://www.apple.com/support/downloads/quicktime715formac.html"
},
{
"title": "QuickTime 7.1.5 for Windows",
"trust": 0.8,
"url": "http://www.apple.com/support/downloads/quicktime715forwindows.html"
},
{
"title": "QuickTime 7.1.5",
"trust": 0.8,
"url": "http://docs.info.apple.com/article.html?artnum=305149"
},
{
"title": "QuickTime 7.1.5",
"trust": 0.8,
"url": "http://docs.info.apple.com/article.html?artnum=305149-ja"
},
{
"title": "\u30a2\u30c3\u30d7\u30eb - QuickTime",
"trust": 0.8,
"url": "http://www.apple.com/jp/quicktime/download/win.html"
},
{
"title": "QuickTime 7.1.5 for Windows",
"trust": 0.8,
"url": "http://www.apple.com/jp/ftp-info/reference/quicktime715forwindows.html"
},
{
"title": "QuickTime 7.1.5 for Mac",
"trust": 0.8,
"url": "http://www.apple.com/jp/ftp-info/reference/quicktime715formac.html"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2007-000197"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-Other",
"trust": 1.0
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2007-0717"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 8.9,
"url": "http://www.securityfocus.com/bid/22827"
},
{
"trust": 8.1,
"url": "http://docs.info.apple.com/article.html?artnum=305149"
},
{
"trust": 6.4,
"url": "http://secunia.com/advisories/24359/"
},
{
"trust": 6.4,
"url": "http://www.auscert.org.au/7356"
},
{
"trust": 6.4,
"url": "http://www.ciac.org/ciac/bulletins/r-171.shtml "
},
{
"trust": 5.6,
"url": "http://securitytracker.com/id?1017725 "
},
{
"trust": 2.8,
"url": "http://www.us-cert.gov/cas/techalerts/ta07-065a.html"
},
{
"trust": 2.8,
"url": "http://www.kb.cert.org/vuls/id/410993"
},
{
"trust": 2.7,
"url": "http://www.apple.com/quicktime/download/"
},
{
"trust": 2.5,
"url": "http://www.securitytracker.com/id?1017725"
},
{
"trust": 2.5,
"url": "http://secunia.com/advisories/24359"
},
{
"trust": 2.4,
"url": "http://www.us-cert.gov/cas/tips/st04-010.html"
},
{
"trust": 2.4,
"url": "http://support.microsoft.com/default.aspx?scid=kb;en-us;q294676"
},
{
"trust": 2.4,
"url": "http://www.cert.org/tech_tips/before_you_plug_in.html"
},
{
"trust": 2.4,
"url": "http://www.mozilla.org/support/firefox/faq"
},
{
"trust": 1.7,
"url": "http://lists.apple.com/archives/security-announce/2007/mar/msg00000.html"
},
{
"trust": 1.7,
"url": "http://osvdb.org/33899"
},
{
"trust": 1.6,
"url": "http://www.apple.com/itunes/"
},
{
"trust": 1.4,
"url": "http://xforce.iss.net/xforce/xfdb/32823"
},
{
"trust": 1.4,
"url": "http://www.frsirt.com/english/advisories/2007/0825"
},
{
"trust": 1.1,
"url": "http://www.vupen.com/english/advisories/2007/0825"
},
{
"trust": 1.1,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32823"
},
{
"trust": 0.8,
"url": "http://www.piotrbania.com/all/adv/quicktime-heap-adv-7.1.txt"
},
{
"trust": 0.8,
"url": "http://en.wikipedia.org/wiki/.mov"
},
{
"trust": 0.8,
"url": "http://www.securityfocus.com/bid/22843"
},
{
"trust": 0.8,
"url": "http://en.wikipedia.org/wiki/musical_instrument_digital_interface"
},
{
"trust": 0.8,
"url": "http://developer.apple.com/documentation/quicktime/qtff/index.html"
},
{
"trust": 0.8,
"url": "http://developer.apple.com/documentation/quicktime/qtff/qtffchap2/chapter_3_section_2.html"
},
{
"trust": 0.8,
"url": "http://secway.org/advisory/ad20070306.txt"
},
{
"trust": 0.8,
"url": "http://secway.org/advisory/ad20060512.txt"
},
{
"trust": 0.8,
"url": "http://www.zerodayinitiative.com/advisories/zdi-07-010.html"
},
{
"trust": 0.8,
"url": "http://www.securityfocus.com/bid/22844"
},
{
"trust": 0.8,
"url": "http://en.wikipedia.org/wiki/pict"
},
{
"trust": 0.8,
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=486"
},
{
"trust": 0.8,
"url": "http://www.reversemode.com/index.php?option=com_remository\u0026itemid=2\u0026func=fileinfo\u0026id=46"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-0717"
},
{
"trust": 0.8,
"url": "http://jvn.jp/cert/jvnta07-065a/index.html"
},
{
"trust": 0.8,
"url": "http://jvn.jp/tr/trta07-065a/index.html"
},
{
"trust": 0.8,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-0717"
},
{
"trust": 0.8,
"url": "http://www.us-cert.gov/cas/alerts/sa07-065a.html"
},
{
"trust": 0.8,
"url": "http://www.cyberpolice.go.jp/important/2007/20070306_153534.html"
},
{
"trust": 0.3,
"url": "http://www.apple.com/quicktime/"
},
{
"trust": 0.3,
"url": "msg://bugtraq/45ec9719.10206@idefense.com"
},
{
"trust": 0.3,
"url": "http://www.kb.cert.org/vuls/id/313225"
},
{
"trust": 0.3,
"url": "http://www.kb.cert.org/vuls/id/448745"
},
{
"trust": 0.3,
"url": "http://www.kb.cert.org/vuls/id/568689"
},
{
"trust": 0.3,
"url": "http://www.kb.cert.org/vuls/id/642433"
},
{
"trust": 0.3,
"url": "http://www.kb.cert.org/vuls/id/822481"
},
{
"trust": 0.3,
"url": "http://www.kb.cert.org/vuls/id/861817"
},
{
"trust": 0.3,
"url": "http://www.kb.cert.org/vuls/id/880561"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#568689"
},
{
"db": "CERT/CC",
"id": "VU#880561"
},
{
"db": "CERT/CC",
"id": "VU#822481"
},
{
"db": "CERT/CC",
"id": "VU#861817"
},
{
"db": "CERT/CC",
"id": "VU#448745"
},
{
"db": "CERT/CC",
"id": "VU#313225"
},
{
"db": "CERT/CC",
"id": "VU#410993"
},
{
"db": "CERT/CC",
"id": "VU#642433"
},
{
"db": "VULHUB",
"id": "VHN-24079"
},
{
"db": "BID",
"id": "22827"
},
{
"db": "CNNVD",
"id": "CNNVD-200703-174"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-000197"
},
{
"db": "NVD",
"id": "CVE-2007-0717"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CERT/CC",
"id": "VU#568689"
},
{
"db": "CERT/CC",
"id": "VU#880561"
},
{
"db": "CERT/CC",
"id": "VU#822481"
},
{
"db": "CERT/CC",
"id": "VU#861817"
},
{
"db": "CERT/CC",
"id": "VU#448745"
},
{
"db": "CERT/CC",
"id": "VU#313225"
},
{
"db": "CERT/CC",
"id": "VU#410993"
},
{
"db": "CERT/CC",
"id": "VU#642433"
},
{
"db": "VULHUB",
"id": "VHN-24079"
},
{
"db": "BID",
"id": "22827"
},
{
"db": "CNNVD",
"id": "CNNVD-200703-174"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-000197"
},
{
"db": "NVD",
"id": "CVE-2007-0717"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2007-03-06T00:00:00",
"db": "CERT/CC",
"id": "VU#568689"
},
{
"date": "2007-03-06T00:00:00",
"db": "CERT/CC",
"id": "VU#880561"
},
{
"date": "2007-03-06T00:00:00",
"db": "CERT/CC",
"id": "VU#822481"
},
{
"date": "2007-03-06T00:00:00",
"db": "CERT/CC",
"id": "VU#861817"
},
{
"date": "2007-03-06T00:00:00",
"db": "CERT/CC",
"id": "VU#448745"
},
{
"date": "2007-03-06T00:00:00",
"db": "CERT/CC",
"id": "VU#313225"
},
{
"date": "2007-03-06T00:00:00",
"db": "CERT/CC",
"id": "VU#410993"
},
{
"date": "2007-03-06T00:00:00",
"db": "CERT/CC",
"id": "VU#642433"
},
{
"date": "2007-03-05T00:00:00",
"db": "VULHUB",
"id": "VHN-24079"
},
{
"date": "2007-03-05T00:00:00",
"db": "BID",
"id": "22827"
},
{
"date": "2007-03-05T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200703-174"
},
{
"date": "2007-04-19T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2007-000197"
},
{
"date": "2007-03-05T22:19:00",
"db": "NVD",
"id": "CVE-2007-0717"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2007-03-19T00:00:00",
"db": "CERT/CC",
"id": "VU#568689"
},
{
"date": "2007-03-19T00:00:00",
"db": "CERT/CC",
"id": "VU#880561"
},
{
"date": "2007-03-19T00:00:00",
"db": "CERT/CC",
"id": "VU#822481"
},
{
"date": "2007-03-19T00:00:00",
"db": "CERT/CC",
"id": "VU#861817"
},
{
"date": "2007-03-09T00:00:00",
"db": "CERT/CC",
"id": "VU#448745"
},
{
"date": "2007-03-19T00:00:00",
"db": "CERT/CC",
"id": "VU#313225"
},
{
"date": "2007-03-19T00:00:00",
"db": "CERT/CC",
"id": "VU#410993"
},
{
"date": "2007-03-19T00:00:00",
"db": "CERT/CC",
"id": "VU#642433"
},
{
"date": "2017-07-29T00:00:00",
"db": "VULHUB",
"id": "VHN-24079"
},
{
"date": "2007-03-06T21:05:00",
"db": "BID",
"id": "22827"
},
{
"date": "2007-06-27T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200703-174"
},
{
"date": "2007-04-19T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2007-000197"
},
{
"date": "2025-04-09T00:30:58.490000",
"db": "NVD",
"id": "CVE-2007-0717"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200703-174"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Apple QuickTime 3GP integer overflow",
"sources": [
{
"db": "CERT/CC",
"id": "VU#568689"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Boundary Condition Error",
"sources": [
{
"db": "BID",
"id": "22827"
},
{
"db": "CNNVD",
"id": "CNNVD-200703-174"
}
],
"trust": 0.9
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.