QuickTime RTSP URL Handler Buffer Overflow (Windows)

This script is Copyright (C) 2007-2016 Tenable Network Security, Inc.

Synopsis :

The remote version of QuickTime is affected by a buffer overflow

Description :

A buffer overflow vulnerability exists in the RTSP URL handler in the
version of QuickTime installed on the remote host. Using either HTML,
JavaScript or a QTL file as an attack vector and an RTSP URL with a
long path component, a remote attacker may be able to leverage this
issue to execute arbitrary code on the remote host subject to the
user's privileges.

See also :


Solution :

Apply Apple's Security Update 2007-001, which is available via the
'Apple Software Update' application, installed with the most recent
version of QuickTime or iTunes.

Risk factor :

Medium / CVSS Base Score : 6.8
CVSS Temporal Score : 5.9
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 24268 ()

Bugtraq ID: 21829

CVE ID: CVE-2007-0015

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now