Korean
<< Back
VID 28219
Severity 40
Port 139,445
Protocol TCP
Class SMB
Detailed Description A version of QuickTime Player which is older than 7.4.1 has been installed on the host. Apple's QuickTime Player is a player that allow users to view local and remote multimedia content. QuickTime Player versions prior to 7.4.1 could allow a remote attacker to execute arbitrary code on the system, caused by a buffer overflow error when processing RTSP response messages and displaying the "Reason-Phrase". By convincing a user to open a specially-crafted QTL file with QuickTime, an attacker could exploit this vulnerability to execute arbitrary code on the affected host.

* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.

* References:
http://docs.info.apple.com/article.html?artnum=307407
http://lists.apple.com/archives/security-announce/2008/Feb/msg00001.html
http://www.securityfocus.com/archive/1/486091
http://secunia.com/advisories/28423/

* Platforms Affected:
Apple QuickTime Player versions prior to 7.4.1 (for Windows)
Apple Mac OS 10.x
Microsoft Windows Any version
Recommendation Upgrade to the latest version of QuickTime Player (7.4.1 or later), available from the Apple Web site at http://www.apple.com/quicktime/
Related URL CVE-2008-0234 (CVE)
Related URL 27225 (SecurityFocus)
Related URL 39601 (ISS)