VAR-200704-0483
Vulnerability from variot - Updated: 2025-04-10 19:41Heap-based buffer overflow in the JVTCompEncodeFrame function in Apple Quicktime 7.1.5 and other versions before 7.2 allows remote attackers to execute arbitrary code via a crafted H.264 MOV file. Apple QuickTime fails to properly handle malformed movie files. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary code or cause a denial-of-service condition. Apple QuickTime是一款流行的多媒体播放器,支持多种媒体格式. QuickTime在处理畸形格式的MOV文件时存在缓冲区溢出漏洞,远程攻击者可能利用此漏洞控制用户机器. 如果使用QuickTime加载了畸形的.mov文件的话,JVTCompEncodeFrame()函数可能无法正确地解析畸形数据,触发堆溢出,播放器会由于分段错误而停止响应,或以登录用户的权限执行任意指令. 调试信息如下: Program received signal EXC_BAD_ACCESS, Could not access memory. Reason: KERN_PROTECTION_FAILURE at address: 0x00041656 0x90003646 in szone_malloc () (gdb) bt #0 0x90003646 in szone_malloc () #1 0x90003527 in malloc_zone_malloc () #2 0x90325591 in mem_heap_malloc () #3 0x90325511 in shape_alloc_bounds () #4 0x9170d8ec in RectRgn () #5 0x91726437 in SetRectRgn () #6 0x9436d3b4 in ICMDeviceLoop () #7 0x9437728a in DecompressSequenceFrameWhen () #8 0x94376c3a in ICMDecompressionSessionDecodeFrame () #9 0x98b0c58c in v2m_rDecompressSequenceFrameWhen () #10 0x98b1333b in v2m_decompressVideoFrame () #11 0x98b13cd7 in QueueAFrame () #12 0x98b14d49 in v2m_doWhatTheMentorTellsUs () #13 0x98b166ac in Video2MoviesTask () #14 0x90cceccf in CallComponentFunctionCommon () #15 0x98b056c0 in Video2ComponentDispatch () #16 0x90cce7f8 in CallComponentDispatch () #17 0x94369f27 in MediaMoviesTask () #18 0x94368c04 in TaskMovie_priv () #19 0x98bb9b42 in doIdleMovie () #20 0x98bc8691 in internalDoAction () #21 0x98bb9a1a in _MCIdle () #22 0x90cceb13 in CallComponentFunctionCommon () #23 0x98bb4f19 in _MCComponentDispatch () #24 0x90cce7f8 in CallComponentDispatch () #25 0x943679fc in MCIdle () #26 0x9436664d in QTOMovieObject::SendCommand () #27 0x9433b1e2 in DispatchQTMsg () #28 0x9433af0f in QTObjectTokenPriv::SendMessageToObject () #29 0x9433a338 in QTObjectTokenPriv::DispatchMessage () #30 0x9436646a in QTSendToObject () #31 0x95a21142 in QTObjectTokenExecuteCommand () #32 0x95a32f85 in -[QTMovie idle] () #33 0x9082a6eb in CFSetApplyFunction () #34 0x95a2feab in +[QTMovie idleAllMovies:] () #35 0x9282c2de in __NSFireTimer () #36 0x9082c7e2 in CFRunLoopRunSpecific () #37 0x9082bace in CFRunLoopRunInMode () #38 0x92dd78d8 in RunCurrentEventLoopInMode () #39 0x92dd6fe2 in ReceiveNextEventCommon () #40 0x92dd6e39 in BlockUntilNextEventMatchingListInMode () #41 0x9327d465 in _DPSNextEvent () #42 0x9327d056 in -[NSApplication nextEventMatchingMask:untilDate:inMode:dequeue:] () #43 0x93276ddb in -[NSApplication run] () #44 0x9326ad2f in NSApplicationMain () #45 0x00040632 in _start () #46 0x0004054d in start () (gdb). Failed exploit attempts likely result in denial-of-service conditions. Apple QuickTime is a popular multimedia player that supports a wide variety of media formats. Remote attackers may take advantage of this vulnerability to control the user's machine. If a malformed .mov file is loaded using QuickTime, the JVTCompEncodeFrame() function may not parse the malformed data correctly, trigger a heap overflow, the player may stop responding due to a segmentation fault, or execute arbitrary commands with the privileges of the logged-in user.
Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure.
The Full Featured Secunia Network Software Inspector (NSI) is now available: http://secunia.com/network_software_inspector/
The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,000 different Windows applications.
TITLE: Apple QuickTime Multiple Vulnerabilities
SECUNIA ADVISORY ID: SA26034
VERIFY ADVISORY: http://secunia.com/advisories/26034/
CRITICAL: Highly critical
IMPACT: Exposure of sensitive information, DoS, System access
WHERE:
From remote
REVISION: 1.1 originally posted 2007-07-12
SOFTWARE: Apple QuickTime 7.x http://secunia.com/product/5090/
DESCRIPTION: Some vulnerabilities have been reported in Apple QuickTime, which can be exploited by malicious people to compromise a user's system.
1) An unspecified error exists in the processing of H.264 movies. This can be exploited to cause memory corruption and may allow execution of arbitrary code when a user accesses a specially crafted H.264 movie.
2) An unspecified error exists in the processing of movie files.
4) An integer overflow error exists in the handling of the "author" and "title" fields when parsing SMIL files.
5) A design error exists in QuickTime for Java, which can be exploited to disable security checks and execute arbitrary code when a user visits a web site containing a specially crafted Java applet.
6) A design error exists in QuickTime for Java, which can be exploited to bypass security checks and read and write to process memory. This can lead to execution of arbitrary code when a user visits a web site containing a specially crafted Java applet.
7) A design error exists in QuickTime for Java due to JDirect exposing interfaces that may allow loading arbitrary libraries and freeing arbitrary memory.
8) A design error exists in QuickTime for Java, which can be exploited to capture the user's screen content when a user visits a web site containing a specially crafted Java applet.
The vulnerabilities are reported in versions prior to 7.2.
SOLUTION: Update to version 7.2.
QuickTime 7.2 for Mac: http://www.apple.com/support/downloads/quicktime72formac.html
QuickTime 7.2 for Windows: http://www.apple.com/support/downloads/quicktime72forwindows.html
PROVIDED AND/OR DISCOVERED BY: 1) The vendor credits Tom Ferris, Security-Protocols.com and Matt Slot, Ambrosia Software, Inc. 2) The vendor credits Jonathan 'Wolf' Rentzsch of Red Shed Software. 3) The vendor credits Tom Ferris, Security-Protocols.com. 4) David Vaartjes of ITsec Security Services, reported via iDefense. 5, 6, 7) The vendor credits Adam Gowdiak. 8) Reported by the vendor.
CHANGELOG: 2007-07-12: Added link to US-CERT.
ORIGINAL ADVISORY: Apple: http://docs.info.apple.com/article.html?artnum=305947
iDefense: http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=556
OTHER REFERENCES: US-CERT VU#582681: http://www.kb.cert.org/vuls/id/582681
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
National Cyber Alert System
Technical Cyber Security Alert TA07-193A
Apple Releases Security Updates for QuickTime
Original release date: July 12, 2007 Last revised: -- Source: US-CERT
Systems Affected
Apple QuickTime on systems running
- Apple Mac OS X
- Microsoft Windows
Overview
Apple QuickTime contains multiple vulnerabilities.
I. Description
Apple QuickTime 7.2 resolves multiple vulnerabilities in the way Java applets and various types of media files are handled. Since QuickTime configures most web browsers to handle QuickTime media files, an attacker could exploit these vulnerabilities using a web page.
Note that QuickTime ships with Apple iTunes.
For more information, please refer to the Vulnerability Notes Database.
II. For further information, please see the Vulnerability Notes Database.
III. Solution
Upgrade QuickTime
Upgrade to QuickTime 7.2. This and other updates for Mac OS X are available via Apple Update.
On Microsoft Windows, QuickTime users can install the update by using the built-in auto-update mechanism, Apple Software Update, or by installing the update manually. Disabling QuickTime in your web browser may defend against this attack vector. For more information, refer to the Securing Your Web Browser document. Disabling Java in your web browser may defend against this attack vector. Instructions for disabling Java can be found in the Securing Your Web Browser document.
References
-
Vulnerability Notes for QuickTime 7.2 - http://www.kb.cert.org/vuls/byid?searchview&query=QuickTime_72
-
About the security content of the QuickTime 7.2 Update - http://docs.info.apple.com/article.html?artnum=305947
-
How to tell if Software Update for Windows is working correctly when no updates are available - http://docs.info.apple.com/article.html?artnum=304263
-
Apple QuickTime 7.2 for Windows - http://www.apple.com/support/downloads/quicktime72forwindows.html
-
Apple QuickTime 7.2 for Mac - http://www.apple.com/support/downloads/quicktime72formac.html
-
Standalone Apple QuickTime Player - http://www.apple.com/quicktime/download/standalone.html
-
Mac OS X: Updating your software - http://docs.info.apple.com/article.html?artnum=106704
-
Securing Your Web Browser - http://www.us-cert.gov/reading_room/securing_browser/
The most recent version of this document can be found at:
<http://www.us-cert.gov/cas/techalerts/TA07-193A.html>
Feedback can be directed to US-CERT Technical Staff. Please send email to cert@cert.org with "TA07-193A Feedback VU#582681" in the subject.
For instructions on subscribing to or unsubscribing from this mailing list, visit http://www.us-cert.gov/cas/signup.html.
Produced 2007 by US-CERT, a government organization.
Terms of use:
<http://www.us-cert.gov/legal.html>
Revision History
Thursday July 12, 2007: Initial release
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux)
iQEVAwUBRpZsJ/RFkHkM87XOAQKLMgf9GpK/pbKTrSe0yKCRMt8Z4lMKl8VE+Rqr 4i8GfVXYUcBKbTlA8TTyf5ucbmCVAnjGJIq0W6X5gLBeA0QxCZ6qto/iPqviuvoV 8tu92/DuerYOkZMvJcn4RjAlMhM9CWCqJh1QG6R2Csn8AyeKEOFDiKYqoDzT+LoQ zojxmlNJIbUvIIGv8Z12Xkr1LLDmD4rs1nfDEBZm7yLTWRItmXpvSidftdUGETDZ +ok1SIhkZEbPNT7gAox9RZaKyIRHV7V4wZwqDd3weo6T7UPlhsgRqe88h1R5Yfq8 a7ePH0WSbTCqdGmuoM+nir4iDldoxB8OpbMUQH1nmWcDmc9xv++MHQ== =EV1X -----END PGP SIGNATURE-----
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-200704-0483",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "quicktime",
"scope": "eq",
"trust": 1.6,
"vendor": "apple",
"version": "7.1.1"
},
{
"model": "quicktime",
"scope": "eq",
"trust": 1.6,
"vendor": "apple",
"version": "7.1.2"
},
{
"model": "quicktime",
"scope": "eq",
"trust": 1.6,
"vendor": "apple",
"version": "7.1"
},
{
"model": "quicktime",
"scope": "eq",
"trust": 1.6,
"vendor": "apple",
"version": "7.1.4"
},
{
"model": "quicktime",
"scope": "eq",
"trust": 1.6,
"vendor": "apple",
"version": "7.1.5"
},
{
"model": "quicktime",
"scope": "eq",
"trust": 1.6,
"vendor": "apple",
"version": "7.1.3"
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "apple computer",
"version": null
},
{
"model": "quicktime",
"scope": "lt",
"trust": 0.8,
"vendor": "apple",
"version": "version"
},
{
"model": "quicktime",
"scope": "eq",
"trust": 0.8,
"vendor": "apple",
"version": "7.2"
},
{
"model": "quicktime player",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "7.1.5"
},
{
"model": "quicktime player",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "7.1.4"
},
{
"model": "quicktime player",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "7.1.3"
},
{
"model": "quicktime player",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "7.1.2"
},
{
"model": "quicktime player",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "7.1.1"
},
{
"model": "quicktime player",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "7.1"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.9"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.9"
},
{
"model": "quicktime player",
"scope": "ne",
"trust": 0.3,
"vendor": "apple",
"version": "7.2"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#582681"
},
{
"db": "BID",
"id": "23650"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-000520"
},
{
"db": "CNNVD",
"id": "CNNVD-200704-524"
},
{
"db": "NVD",
"id": "CVE-2007-2295"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:apple:quicktime",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2007-000520"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Tom Ferris tommy@security-protocols.com",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200704-524"
}
],
"trust": 0.6
},
"cve": "CVE-2007-2295",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 8.6,
"id": "CVE-2007-2295",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 1.8,
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 8.6,
"id": "VHN-25657",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2007-2295",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "CARNEGIE MELLON",
"id": "VU#582681",
"trust": 0.8,
"value": "8.66"
},
{
"author": "NVD",
"id": "CVE-2007-2295",
"trust": 0.8,
"value": "High"
},
{
"author": "CNNVD",
"id": "CNNVD-200704-524",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-25657",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#582681"
},
{
"db": "VULHUB",
"id": "VHN-25657"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-000520"
},
{
"db": "CNNVD",
"id": "CNNVD-200704-524"
},
{
"db": "NVD",
"id": "CVE-2007-2295"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Heap-based buffer overflow in the JVTCompEncodeFrame function in Apple Quicktime 7.1.5 and other versions before 7.2 allows remote attackers to execute arbitrary code via a crafted H.264 MOV file. Apple QuickTime fails to properly handle malformed movie files. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary code or cause a denial-of-service condition. Apple QuickTime\u662f\u4e00\u6b3e\u6d41\u884c\u7684\u591a\u5a92\u4f53\u64ad\u653e\u5668\uff0c\u652f\u6301\u591a\u79cd\u5a92\u4f53\u683c\u5f0f. \nQuickTime\u5728\u5904\u7406\u7578\u5f62\u683c\u5f0f\u7684MOV\u6587\u4ef6\u65f6\u5b58\u5728\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\uff0c\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u80fd\u5229\u7528\u6b64\u6f0f\u6d1e\u63a7\u5236\u7528\u6237\u673a\u5668. \n\u5982\u679c\u4f7f\u7528QuickTime\u52a0\u8f7d\u4e86\u7578\u5f62\u7684.mov\u6587\u4ef6\u7684\u8bdd\uff0cJVTCompEncodeFrame()\u51fd\u6570\u53ef\u80fd\u65e0\u6cd5\u6b63\u786e\u5730\u89e3\u6790\u7578\u5f62\u6570\u636e\uff0c\u89e6\u53d1\u5806\u6ea2\u51fa\uff0c\u64ad\u653e\u5668\u4f1a\u7531\u4e8e\u5206\u6bb5\u9519\u8bef\u800c\u505c\u6b62\u54cd\u5e94\uff0c\u6216\u4ee5\u767b\u5f55\u7528\u6237\u7684\u6743\u9650\u6267\u884c\u4efb\u610f\u6307\u4ee4. \n\u8c03\u8bd5\u4fe1\u606f\u5982\u4e0b\uff1a\nProgram received signal EXC_BAD_ACCESS, Could not access memory. \nReason\uff1a KERN_PROTECTION_FAILURE at address\uff1a 0x00041656\n0x90003646 in szone_malloc ()\n(gdb) bt\n\uff030 0x90003646 in szone_malloc ()\n\uff031 0x90003527 in malloc_zone_malloc ()\n\uff032 0x90325591 in mem_heap_malloc ()\n\uff033 0x90325511 in shape_alloc_bounds () \uff034 0x9170d8ec in RectRgn ()\n\uff035 0x91726437 in SetRectRgn ()\n\uff036 0x9436d3b4 in ICMDeviceLoop ()\n\uff037 0x9437728a in DecompressSequenceFrameWhen ()\n\uff038 0x94376c3a in ICMDecompressionSessionDecodeFrame ()\n\uff039 0x98b0c58c in v2m_rDecompressSequenceFrameWhen ()\n\uff0310 0x98b1333b in v2m_decompressVideoFrame ()\n\uff0311 0x98b13cd7 in QueueAFrame ()\n\uff0312 0x98b14d49 in v2m_doWhatTheMentorTellsUs ()\n\uff0313 0x98b166ac in Video2MoviesTask ()\n\uff0314 0x90cceccf in CallComponentFunctionCommon ()\n\uff0315 0x98b056c0 in Video2ComponentDispatch ()\n\uff0316 0x90cce7f8 in CallComponentDispatch ()\n\uff0317 0x94369f27 in MediaMoviesTask ()\n\uff0318 0x94368c04 in TaskMovie_priv ()\n\uff0319 0x98bb9b42 in doIdleMovie ()\n\uff0320 0x98bc8691 in internalDoAction ()\n\uff0321 0x98bb9a1a in _MCIdle ()\n\uff0322 0x90cceb13 in CallComponentFunctionCommon ()\n\uff0323 0x98bb4f19 in _MCComponentDispatch ()\n\uff0324 0x90cce7f8 in CallComponentDispatch ()\n\uff0325 0x943679fc in MCIdle ()\n\uff0326 0x9436664d in QTOMovieObject\uff1a\uff1aSendCommand ()\n\uff0327 0x9433b1e2 in DispatchQTMsg ()\n\uff0328 0x9433af0f in QTObjectTokenPriv\uff1a\uff1aSendMessageToObject ()\n\uff0329 0x9433a338 in QTObjectTokenPriv\uff1a\uff1aDispatchMessage ()\n\uff0330 0x9436646a in QTSendToObject ()\n\uff0331 0x95a21142 in QTObjectTokenExecuteCommand ()\n\uff0332 0x95a32f85 in -[QTMovie idle] ()\n\uff0333 0x9082a6eb in CFSetApplyFunction ()\n\uff0334 0x95a2feab in +[QTMovie idleAllMovies\uff1a] ()\n\uff0335 0x9282c2de in __NSFireTimer ()\n\uff0336 0x9082c7e2 in CFRunLoopRunSpecific ()\n\uff0337 0x9082bace in CFRunLoopRunInMode ()\n\uff0338 0x92dd78d8 in RunCurrentEventLoopInMode ()\n\uff0339 0x92dd6fe2 in ReceiveNextEventCommon ()\n\uff0340 0x92dd6e39 in BlockUntilNextEventMatchingListInMode ()\n\uff0341 0x9327d465 in _DPSNextEvent ()\n\uff0342 0x9327d056 in -[NSApplication nextEventMatchingMask\uff1auntilDate\uff1ainMode\uff1adequeue\uff1a] ()\n\uff0343 0x93276ddb in -[NSApplication run] ()\n\uff0344 0x9326ad2f in NSApplicationMain ()\n\uff0345 0x00040632 in _start ()\n\uff0346 0x0004054d in start ()\n(gdb). Failed exploit attempts likely result in denial-of-service conditions. Apple QuickTime is a popular multimedia player that supports a wide variety of media formats. Remote attackers may take advantage of this vulnerability to control the user\u0027s machine. If a malformed .mov file is loaded using QuickTime, the JVTCompEncodeFrame() function may not parse the malformed data correctly, trigger a heap overflow, the player may stop responding due to a segmentation fault, or execute arbitrary commands with the privileges of the logged-in user. \n\n----------------------------------------------------------------------\n\nTry a new way to discover vulnerabilities that ALREADY EXIST in your\nIT infrastructure. \n\nThe Full Featured Secunia Network Software Inspector (NSI) is now\navailable:\nhttp://secunia.com/network_software_inspector/\n\nThe Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT\nvulnerabilities in more than 4,000 different Windows applications. \n\n----------------------------------------------------------------------\n\nTITLE:\nApple QuickTime Multiple Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA26034\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/26034/\n\nCRITICAL:\nHighly critical\n\nIMPACT:\nExposure of sensitive information, DoS, System access\n\nWHERE:\n\u003eFrom remote\n\nREVISION:\n1.1 originally posted 2007-07-12\n\nSOFTWARE:\nApple QuickTime 7.x\nhttp://secunia.com/product/5090/\n\nDESCRIPTION:\nSome vulnerabilities have been reported in Apple QuickTime, which can\nbe exploited by malicious people to compromise a user\u0027s system. \n\n1) An unspecified error exists in the processing of H.264 movies. \nThis can be exploited to cause memory corruption and may allow\nexecution of arbitrary code when a user accesses a specially crafted\nH.264 movie. \n\n2) An unspecified error exists in the processing of movie files. \n\n4) An integer overflow error exists in the handling of the \"author\"\nand \"title\" fields when parsing SMIL files. \n\n5) A design error exists in QuickTime for Java, which can be\nexploited to disable security checks and execute arbitrary code when\na user visits a web site containing a specially crafted Java applet. \n\n6) A design error exists in QuickTime for Java, which can be\nexploited to bypass security checks and read and write to process\nmemory. This can lead to execution of arbitrary code when a user\nvisits a web site containing a specially crafted Java applet. \n\n7) A design error exists in QuickTime for Java due to JDirect\nexposing interfaces that may allow loading arbitrary libraries and\nfreeing arbitrary memory. \n\n8) A design error exists in QuickTime for Java, which can be\nexploited to capture the user\u0027s screen content when a user visits a\nweb site containing a specially crafted Java applet. \n\nThe vulnerabilities are reported in versions prior to 7.2. \n\nSOLUTION:\nUpdate to version 7.2. \n\nQuickTime 7.2 for Mac:\nhttp://www.apple.com/support/downloads/quicktime72formac.html\n\nQuickTime 7.2 for Windows:\nhttp://www.apple.com/support/downloads/quicktime72forwindows.html\n\nPROVIDED AND/OR DISCOVERED BY:\n1) The vendor credits Tom Ferris, Security-Protocols.com and Matt\nSlot, Ambrosia Software, Inc. \n2) The vendor credits Jonathan \u0027Wolf\u0027 Rentzsch of Red Shed Software. \n3) The vendor credits Tom Ferris, Security-Protocols.com. \n4) David Vaartjes of ITsec Security Services, reported via iDefense. \n5, 6, 7) The vendor credits Adam Gowdiak. \n8) Reported by the vendor. \n\nCHANGELOG:\n2007-07-12: Added link to US-CERT. \n\nORIGINAL ADVISORY:\nApple:\nhttp://docs.info.apple.com/article.html?artnum=305947\n\niDefense:\nhttp://labs.idefense.com/intelligence/vulnerabilities/display.php?id=556\n\nOTHER REFERENCES:\nUS-CERT VU#582681:\nhttp://www.kb.cert.org/vuls/id/582681\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. \n-----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n\n National Cyber Alert System\n\n\t\tTechnical Cyber Security Alert TA07-193A\n\n\nApple Releases Security Updates for QuickTime\n\n Original release date: July 12, 2007\n Last revised: --\n Source: US-CERT\n\n\nSystems Affected\n\n Apple QuickTime on systems running\n\n * Apple Mac OS X\n * Microsoft Windows\n\n\nOverview\n\n Apple QuickTime contains multiple vulnerabilities. \n\n\nI. Description\n\n Apple QuickTime 7.2 resolves multiple vulnerabilities in the way\n Java applets and various types of media files are handled. Since QuickTime configures most\n web browsers to handle QuickTime media files, an attacker could\n exploit these vulnerabilities using a web page. \n\n Note that QuickTime ships with Apple iTunes. \n\n For more information, please refer to the Vulnerability Notes\n Database. \n\n\nII. For further information, please see\n the Vulnerability Notes Database. \n\n\nIII. Solution\n\nUpgrade QuickTime\n\n Upgrade to QuickTime 7.2. This and other updates for Mac OS X are\n available via Apple Update. \n\n On Microsoft Windows, QuickTime users can install the update by\n using the built-in auto-update mechanism, Apple Software Update, or\n by installing the update manually. Disabling QuickTime in your web browser may defend\n against this attack vector. For more information, refer to the\n Securing Your Web Browser document. Disabling Java in your web browser may defend against\n this attack vector. Instructions for disabling Java can be found in\n the Securing Your Web Browser document. \n\n\nReferences\n\n * Vulnerability Notes for QuickTime 7.2 -\n \u003chttp://www.kb.cert.org/vuls/byid?searchview\u0026query=QuickTime_72\u003e\n\n * About the security content of the QuickTime 7.2 Update -\n \u003chttp://docs.info.apple.com/article.html?artnum=305947\u003e\n\n * How to tell if Software Update for Windows is working correctly when no updates are available -\n \u003chttp://docs.info.apple.com/article.html?artnum=304263\u003e\n\n * Apple QuickTime 7.2 for Windows -\n \u003chttp://www.apple.com/support/downloads/quicktime72forwindows.html\u003e\n\n * Apple QuickTime 7.2 for Mac -\n \u003chttp://www.apple.com/support/downloads/quicktime72formac.html\u003e\n\n * Standalone Apple QuickTime Player -\n \u003chttp://www.apple.com/quicktime/download/standalone.html\u003e\n\n * Mac OS X: Updating your software -\n \u003chttp://docs.info.apple.com/article.html?artnum=106704\u003e\n\n * Securing Your Web Browser -\n \u003chttp://www.us-cert.gov/reading_room/securing_browser/\u003e\n \n\n ____________________________________________________________________\n\n The most recent version of this document can be found at:\n\n \u003chttp://www.us-cert.gov/cas/techalerts/TA07-193A.html\u003e\n ____________________________________________________________________\n\n Feedback can be directed to US-CERT Technical Staff. Please send\n email to \u003ccert@cert.org\u003e with \"TA07-193A Feedback VU#582681\" in the\n subject. \n ____________________________________________________________________\n\n For instructions on subscribing to or unsubscribing from this\n mailing list, visit \u003chttp://www.us-cert.gov/cas/signup.html\u003e. \n ____________________________________________________________________\n\n Produced 2007 by US-CERT, a government organization. \n\n Terms of use:\n\n \u003chttp://www.us-cert.gov/legal.html\u003e\n ____________________________________________________________________\n\n\nRevision History\n\n Thursday July 12, 2007: Initial release\n\n\n\n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.2.1 (GNU/Linux)\n\niQEVAwUBRpZsJ/RFkHkM87XOAQKLMgf9GpK/pbKTrSe0yKCRMt8Z4lMKl8VE+Rqr\n4i8GfVXYUcBKbTlA8TTyf5ucbmCVAnjGJIq0W6X5gLBeA0QxCZ6qto/iPqviuvoV\n8tu92/DuerYOkZMvJcn4RjAlMhM9CWCqJh1QG6R2Csn8AyeKEOFDiKYqoDzT+LoQ\nzojxmlNJIbUvIIGv8Z12Xkr1LLDmD4rs1nfDEBZm7yLTWRItmXpvSidftdUGETDZ\n+ok1SIhkZEbPNT7gAox9RZaKyIRHV7V4wZwqDd3weo6T7UPlhsgRqe88h1R5Yfq8\na7ePH0WSbTCqdGmuoM+nir4iDldoxB8OpbMUQH1nmWcDmc9xv++MHQ==\n=EV1X\n-----END PGP SIGNATURE-----\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2007-2295"
},
{
"db": "CERT/CC",
"id": "VU#582681"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-000520"
},
{
"db": "CNNVD",
"id": "CNNVD-200704-524"
},
{
"db": "BID",
"id": "23650"
},
{
"db": "VULHUB",
"id": "VHN-25657"
},
{
"db": "PACKETSTORM",
"id": "57697"
},
{
"db": "PACKETSTORM",
"id": "57713"
}
],
"trust": 3.42
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "BID",
"id": "23650",
"trust": 2.8
},
{
"db": "NVD",
"id": "CVE-2007-2295",
"trust": 2.8
},
{
"db": "SECUNIA",
"id": "26034",
"trust": 2.7
},
{
"db": "USCERT",
"id": "TA07-193A",
"trust": 2.6
},
{
"db": "SECTRACK",
"id": "1017965",
"trust": 2.5
},
{
"db": "OSVDB",
"id": "35577",
"trust": 1.7
},
{
"db": "SECTRACK",
"id": "1018373",
"trust": 1.7
},
{
"db": "VUPEN",
"id": "ADV-2007-2510",
"trust": 1.7
},
{
"db": "XF",
"id": "35356",
"trust": 1.4
},
{
"db": "CERT/CC",
"id": "VU#582681",
"trust": 0.9
},
{
"db": "USCERT",
"id": "SA07-193A",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2007-000520",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-200704-524",
"trust": 0.7
},
{
"db": "XF",
"id": "264",
"trust": 0.6
},
{
"db": "XF",
"id": "34070",
"trust": 0.6
},
{
"db": "APPLE",
"id": "APPLE-SA-2007-07-11",
"trust": 0.6
},
{
"db": "CERT/CC",
"id": "TA07-193A",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-25657",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "57697",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "57713",
"trust": 0.1
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#582681"
},
{
"db": "VULHUB",
"id": "VHN-25657"
},
{
"db": "BID",
"id": "23650"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-000520"
},
{
"db": "PACKETSTORM",
"id": "57697"
},
{
"db": "PACKETSTORM",
"id": "57713"
},
{
"db": "CNNVD",
"id": "CNNVD-200704-524"
},
{
"db": "NVD",
"id": "CVE-2007-2295"
}
]
},
"id": "VAR-200704-0483",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-25657"
}
],
"trust": 0.01
},
"last_update_date": "2025-04-10T19:41:30.005000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "QuickTime 7.2 for Mac",
"trust": 0.8,
"url": "http://www.apple.com/support/downloads/quicktime72formac.html"
},
{
"title": "QuickTime 7.2 for Windows",
"trust": 0.8,
"url": "http://www.apple.com/support/downloads/quicktime72forwindows.html"
},
{
"title": "About the security content of QuickTime 7.2",
"trust": 0.8,
"url": "http://docs.info.apple.com/article.html?artnum=305947-en"
},
{
"title": "About the security content of QuickTime 7.2",
"trust": 0.8,
"url": "http://docs.info.apple.com/article.html?artnum=305947-ja"
},
{
"title": "\u30a2\u30c3\u30d7\u30eb - QuickTime",
"trust": 0.8,
"url": "http://www.apple.com/jp/quicktime/download/win.html"
},
{
"title": "QuickTime 7.2 for Windows",
"trust": 0.8,
"url": "http://www.apple.com/jp/ftp-info/reference/quicktime72forwindows.html"
},
{
"title": "QuickTime 7.2 for Mac",
"trust": 0.8,
"url": "http://www.apple.com/jp/ftp-info/reference/quicktime72formac.html"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2007-000520"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-119",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-25657"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-000520"
},
{
"db": "NVD",
"id": "CVE-2007-2295"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.5,
"url": "http://www.securityfocus.com/bid/23650"
},
{
"trust": 2.5,
"url": "http://www.us-cert.gov/cas/techalerts/ta07-193a.html"
},
{
"trust": 2.5,
"url": "http://www.securitytracker.com/id?1017965"
},
{
"trust": 2.5,
"url": "http://secunia.com/advisories/26034"
},
{
"trust": 2.0,
"url": "http://security-protocols.com/sp-x45-advisory.php"
},
{
"trust": 1.8,
"url": "http://docs.info.apple.com/article.html?artnum=305947"
},
{
"trust": 1.7,
"url": "http://lists.apple.com/archives/security-announce/2007/jul/msg00001.html"
},
{
"trust": 1.7,
"url": "http://www.osvdb.org/35577"
},
{
"trust": 1.7,
"url": "http://www.securitytracker.com/id?1018373"
},
{
"trust": 1.4,
"url": "http://www.frsirt.com/english/advisories/2007/2510"
},
{
"trust": 1.4,
"url": "http://xforce.iss.net/xforce/xfdb/35356"
},
{
"trust": 1.1,
"url": "http://www.vupen.com/english/advisories/2007/2510"
},
{
"trust": 1.1,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35356"
},
{
"trust": 1.1,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34070"
},
{
"trust": 0.8,
"url": "about vulnerability notes"
},
{
"trust": 0.8,
"url": "contact us about this vulnerability"
},
{
"trust": 0.8,
"url": "provide a vendor statement"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-2295"
},
{
"trust": 0.8,
"url": "http://jvn.jp/cert/jvnta07-193a/index.html"
},
{
"trust": 0.8,
"url": "http://jvn.jp/tr/trta07-193a/index.html"
},
{
"trust": 0.8,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-2295"
},
{
"trust": 0.8,
"url": "http://www.us-cert.gov/cas/alerts/sa07-193a.html"
},
{
"trust": 0.6,
"url": "http://xforce.iss.net/xforce/xfdb/34070"
},
{
"trust": 0.3,
"url": "http://www.apple.com/quicktime/"
},
{
"trust": 0.1,
"url": "http://secunia.com/secunia_security_advisories/"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/5090/"
},
{
"trust": 0.1,
"url": "http://secunia.com/network_software_inspector/"
},
{
"trust": 0.1,
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=556"
},
{
"trust": 0.1,
"url": "http://www.kb.cert.org/vuls/id/582681"
},
{
"trust": 0.1,
"url": "http://www.apple.com/support/downloads/quicktime72formac.html"
},
{
"trust": 0.1,
"url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/26034/"
},
{
"trust": 0.1,
"url": "http://www.apple.com/support/downloads/quicktime72forwindows.html"
},
{
"trust": 0.1,
"url": "http://secunia.com/about_secunia_advisories/"
},
{
"trust": 0.1,
"url": "http://docs.info.apple.com/article.html?artnum=304263\u003e"
},
{
"trust": 0.1,
"url": "http://www.us-cert.gov/cas/techalerts/ta07-193a.html\u003e"
},
{
"trust": 0.1,
"url": "http://docs.info.apple.com/article.html?artnum=305947\u003e"
},
{
"trust": 0.1,
"url": "http://www.apple.com/quicktime/download/standalone.html\u003e"
},
{
"trust": 0.1,
"url": "http://www.apple.com/support/downloads/quicktime72formac.html\u003e"
},
{
"trust": 0.1,
"url": "http://www.apple.com/support/downloads/quicktime72forwindows.html\u003e"
},
{
"trust": 0.1,
"url": "http://www.us-cert.gov/legal.html\u003e"
},
{
"trust": 0.1,
"url": "http://docs.info.apple.com/article.html?artnum=106704\u003e"
},
{
"trust": 0.1,
"url": "http://www.us-cert.gov/cas/signup.html\u003e."
},
{
"trust": 0.1,
"url": "http://www.kb.cert.org/vuls/byid?searchview\u0026query=quicktime_72\u003e"
},
{
"trust": 0.1,
"url": "http://www.us-cert.gov/reading_room/securing_browser/\u003e"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#582681"
},
{
"db": "VULHUB",
"id": "VHN-25657"
},
{
"db": "BID",
"id": "23650"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-000520"
},
{
"db": "PACKETSTORM",
"id": "57697"
},
{
"db": "PACKETSTORM",
"id": "57713"
},
{
"db": "CNNVD",
"id": "CNNVD-200704-524"
},
{
"db": "NVD",
"id": "CVE-2007-2295"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CERT/CC",
"id": "VU#582681"
},
{
"db": "VULHUB",
"id": "VHN-25657"
},
{
"db": "BID",
"id": "23650"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-000520"
},
{
"db": "PACKETSTORM",
"id": "57697"
},
{
"db": "PACKETSTORM",
"id": "57713"
},
{
"db": "CNNVD",
"id": "CNNVD-200704-524"
},
{
"db": "NVD",
"id": "CVE-2007-2295"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2007-07-12T00:00:00",
"db": "CERT/CC",
"id": "VU#582681"
},
{
"date": "2007-04-26T00:00:00",
"db": "VULHUB",
"id": "VHN-25657"
},
{
"date": "2007-04-25T00:00:00",
"db": "BID",
"id": "23650"
},
{
"date": "2007-07-24T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2007-000520"
},
{
"date": "2007-07-13T00:55:11",
"db": "PACKETSTORM",
"id": "57697"
},
{
"date": "2007-07-13T01:43:24",
"db": "PACKETSTORM",
"id": "57713"
},
{
"date": "2007-04-26T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200704-524"
},
{
"date": "2007-04-26T20:19:00",
"db": "NVD",
"id": "CVE-2007-2295"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2007-07-13T00:00:00",
"db": "CERT/CC",
"id": "VU#582681"
},
{
"date": "2017-07-29T00:00:00",
"db": "VULHUB",
"id": "VHN-25657"
},
{
"date": "2007-07-12T04:07:00",
"db": "BID",
"id": "23650"
},
{
"date": "2007-07-24T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2007-000520"
},
{
"date": "2007-04-27T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200704-524"
},
{
"date": "2025-04-09T00:30:58.490000",
"db": "NVD",
"id": "CVE-2007-2295"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "PACKETSTORM",
"id": "57713"
},
{
"db": "CNNVD",
"id": "CNNVD-200704-524"
}
],
"trust": 0.7
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Apple QuickTime fails to properly handle malformed movie files",
"sources": [
{
"db": "CERT/CC",
"id": "VU#582681"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "buffer overflow",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200704-524"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.