Overview
Apple QuickTime may allow remote arbitrary code to be executed via a long src parameter in RTSP URL strings.
Description
A vulnerability exists in the way Apple QuickTime handles specially crafted Real Time Streaming Protocol (RTSP) URL strings. An attacker may be able to craft a QTL file to take advantage of this vulnerability. However, there are other attack vectors that do not involve QTL files. According to MOAB-01-01-2007: By supplying a specially crafted string (rtsp:// [random] + semicolon + [299 bytes padding + payload]), an attacker could overflow a stack-based buffer, using either HTML, Javascript or a QTL file as attack vector, leading to an exploitable remote arbitrary code execution condition. |
Impact
A remote, unauthenticated attacker may be able to execute arbitrary code or cause a denial of service. |
Solution
Apply Update |
|
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
- http://projects.info-pull.com/moab/MOAB-01-01-2007.html
- http://secunia.com/advisories/23540/
- http://www.securityfocus.com/bid/21829
- http://plugindoc.mozdev.org/faqs/uninstall.html
- http://support.microsoft.com/kb/240797
- http://docs.info.apple.com/article.html?artnum=304989
- http://docs.info.apple.com/article.html?artnum=106704
- http://docs.info.apple.com/article.html?artnum=304264
- http://search.info.apple.com/?search=Go&q=2007-001
- http://lists.apple.com/archives/Security-announce/2007/Jan/msg00000.html
- http://search.info.apple.com/?search=Go&q=2007-001
- http://secunia.com/blog/7/
Acknowledgements
This issue was reported in MOAB-01-01-2007.
This document was written by Chris Taschner and Will Dormann.
Other Information
CVE IDs: | CVE-2007-0015 |
Severity Metric: | 27.00 |
Date Public: | 2007-01-02 |
Date First Published: | 2007-01-02 |
Date Last Updated: | 2007-01-25 22:05 UTC |
Document Revision: | 45 |