Korean
<< Back
VID 28038
Severity 40
Port 139,445
Protocol TCP
Class SMB
Detailed Description The version of the Quicktime player is vulnerable to a buffer overflow attack.
QuickTime Player is a popular media player for both the Microsoft Windows and Apple Mac platforms. An exploitable buffer overflow condition has been discovered in Apple Computer Inc.'s QuickTime Player, allowing for the remote execution of arbitrary code. This exploit is only possible if the attacker can convince a user to load a specially crafted QuickTime URL. Upon successful exploitation, arbitrary code can be executed under the privileges of the QuickTime user.

* Note: This check requires an account with Guest or upper privileges which can access the registry of the remote host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.

* References:
http://www.idefense.com/advisory/03.31.03.txt
http://lists.apple.com/mhonarc/security-announce/msg00027.html
http://www.securiteam.com/windowsntfocus/5NP020A9PW.html
http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0166.html

* Platforms Affected:
QuickTime Player versions 5.x and 6.0 for the Microsoft Windows platform
Recommendation Upgrade to the latest version of Quicktime Player (6.1 or later).

QuickTime 6.1 for Windows is available via:
http://www.apple.com/quicktime/download/

-- OR --

"Update Existing Software" menu item in QuickTime Player
Related URL CVE-2003-0168 (CVE)
Related URL 7247 (SecurityFocus)
Related URL (ISS)