VID |
28223 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
A version of QuickTime Player which is older than 7.4.5 has been installed on the host. Apple's QuickTime Player is a player that allow users to view local and remote multimedia content. QuickTime Player versions prior to 7.4.5 could allow a remote attacker to execute arbitrary code on the system, caused by a buffer overflow error when processing RTSP response messages and displaying the "Reason-Phrase". By convincing a user to open a specially-crafted QTL file with QuickTime, an attacker could exploit this vulnerability to execute arbitrary code on the affected host.
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: http://support.apple.com/kb/HT1241 http://lists.apple.com/archives/security-announce/2008/Apr//msg00000.html http://secunia.com/advisories/29650/
* Platforms Affected: Apple QuickTime Player versions prior to 7.4.5 (for Windows) Apple Mac OS 10.x Microsoft Windows Any version |
Recommendation |
Upgrade to the latest version of QuickTime Player (7.4.5 or later), available from the Apple Web site at http://www.apple.com/quicktime/ |
Related URL |
CVE-2008-1014,CVE-2008-1015,CVE-2008-1016,CVE-2008-1017,CVE-2008-1018,CVE-2008-1019,CVE-2008-1020,CVE-2008-1021,CVE-2008-1022,CVE-2008-1023 (CVE) |
Related URL |
28583 (SecurityFocus) |
Related URL |
41602,41604,41605,41606,41607,41609,41610,41612,41613,41615 (ISS) |
|