QuickTime < 7.7.3 Multiple Vulnerabilities (Windows)

This script is Copyright (C) 2012-2013 Tenable Network Security, Inc.


Synopsis :

The remote Windows host contains an application that may be affected
by multiple vulnerabilities.

Description :

The version of QuickTime installed on the remote Windows host is
older than 7.7.3 and therefore is reportedly affected by the
following vulnerabilities :

- A buffer overflow exists in the handling of REGION
records in PICT files. (CVE-2011-1374)

- A memory corruption issue exists in the handling of
PICT files. (CVE-2012-3757)

- A use-after-free issue exists in the QuickTime plugin's
handling of '_qtactivex_' parameters within an HTML
object element. (CVE-2012-3751)

- A buffer overflow exists in the handling of the
transform attribute in text3GTrack elements in TeXML
files. (CVE-2012-3758)

- Multiple buffer overflows exist in the handling of
style elements in TeXML files. (CVE-2012-3752)

- A buffer overflow exists in the handling of MIME types.
(CVE-2012-3753)

- A use-after-free issue exists in the QuickTime ActiveX
control's handling of the 'Clear()' method.
(CVE-2012-3754)

- A buffer overflow exists in the handling of Targa image
files. (CVE-2012-3755)

- A buffer overflow exists in the handling of 'rnet'
boxes in MP4 files. (CVE-2012-3756)

Successful exploitation of these issues could result in program
termination or arbitrary code execution, subject to the user's
privileges.

See also :

http://support.apple.com/kb/HT5581
http://lists.apple.com/archives/security-announce/2012/Nov/msg00002.html
http://www.securityfocus.com/archive/1/524662/30/0/threaded

Solution :

Upgrade to QuickTime 7.7.3 or later.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.3
(CVSS2#E:POC/RL:OF/RC:C)
Public Exploit Available : true