VID |
28184 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
The QuickTime Player is vulnerable to a buffer overflow vulnerability in the RTSP URL handler. Apple's QuickTime Player is a player that allow users to view local and remote multimedia content. QuickTime Player versions prior to 7.1.3.191 could allow a remote attacker to execute arbitrary code, caused by a stack-based buffer overflow when handling RTSP URLs. By convincing a user to open a specially crafted QTL file with an overly long (more than 256 bytes) "src" parameter, an attacker could cause QuickTime to crash or potentially execute arbitrary code on the affected host.
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: http://docs.info.apple.com/article.html?artnum=304989 http://lists.apple.com/archives/Security-announce/2007/Jan/msg00000.html http://applefun.blogspot.com/2007/01/moab-01-01-2007-apple-quicktime-rtsp.html http://projects.info-pull.com/moab/MOAB-01-01-2007.html http://www.kb.cert.org/vuls/id/442497 http://secunia.com/advisories/23540/
* Platforms Affected: Apple QuickTime Player versions prior to 7.1.3.191 (for Windows) Apple Mac OS 10.x Microsoft Windows Any version |
Recommendation |
Apply Apple's Security Update 2007-001, as listed in Apple Security Update 2007-001 at http://docs.info.apple.com/article.html?artnum=304989 |
Related URL |
CVE-2007-0015 (CVE) |
Related URL |
21829 (SecurityFocus) |
Related URL |
31203 (ISS) |
|