Korean
<< Back
VID 28184
Severity 40
Port 139,445
Protocol TCP
Class SMB
Detailed Description The QuickTime Player is vulnerable to a buffer overflow vulnerability in the RTSP URL handler. Apple's QuickTime Player is a player that allow users to view local and remote multimedia content. QuickTime Player versions prior to 7.1.3.191 could allow a remote attacker to execute arbitrary code, caused by a stack-based buffer overflow when handling RTSP URLs. By convincing a user to open a specially crafted QTL file with an overly long (more than 256 bytes) "src" parameter, an attacker could cause QuickTime to crash or potentially execute arbitrary code on the affected host.

* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.

* References:
http://docs.info.apple.com/article.html?artnum=304989
http://lists.apple.com/archives/Security-announce/2007/Jan/msg00000.html
http://applefun.blogspot.com/2007/01/moab-01-01-2007-apple-quicktime-rtsp.html
http://projects.info-pull.com/moab/MOAB-01-01-2007.html
http://www.kb.cert.org/vuls/id/442497
http://secunia.com/advisories/23540/

* Platforms Affected:
Apple QuickTime Player versions prior to 7.1.3.191 (for Windows)
Apple Mac OS 10.x
Microsoft Windows Any version
Recommendation Apply Apple's Security Update 2007-001, as listed in Apple Security Update 2007-001 at http://docs.info.apple.com/article.html?artnum=304989
Related URL CVE-2007-0015 (CVE)
Related URL 21829 (SecurityFocus)
Related URL 31203 (ISS)