VID |
28213 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
A version of QuickTime Player which is older than 7.3 has been installed on the host. Apple's QuickTime Player is a player that allow users to view local and remote multimedia content. QuickTime Player versions prior to 7.3 are vulnerable to multiple vulnerabilities. By convincing a user to open a specially-crafted Web page containing a malicious Java applet, an attacker could exploit these vulnerabilities to execute arbitrary code on the affected host.
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: http://docs.info.apple.com/article.html?artnum=306896 http://lists.apple.com/archives/security-announce/2007/Nov/msg00000.html http://www.zerodayinitiative.com/advisories/ZDI-07-065.html http://www.zerodayinitiative.com/advisories/ZDI-07-067.html http://www.kb.cert.org/vuls/id/690515 http://www.frsirt.com/english/advisories/2007/3723 http://securitytracker.com/alerts/2007/Nov/1018894.html http://secunia.com/advisories/27523
* Platforms Affected: Apple QuickTime Player versions prior to 7.3 (for Windows) Apple Mac OS 10.x Microsoft Windows Any version |
Recommendation |
Upgrade to the latest version of QuickTime Player (7.3 or later), available from the Apple Web site at http://www.apple.com/quicktime/ |
Related URL |
CVE-2007-2395,CVE-2007-3750,CVE-2007-3751,CVE-2007-4672,CVE-2007-4675,CVE-2007-4676,CVE-2007-4677 (CVE) |
Related URL |
26338,26339,26340,26341,26342,26344,26345,26443 (SecurityFocus) |
Related URL |
38266,38268,38271,38279,38280,38281,38282,38283 (ISS) |
|