QuickTime RTSP URL Handler Buffer Overflow (Windows)

This script is Copyright (C) 2007-2016 Tenable Network Security, Inc.


Synopsis :

The remote version of QuickTime is affected by a buffer overflow
vulnerability.

Description :

A buffer overflow vulnerability exists in the RTSP URL handler in the
version of QuickTime installed on the remote host. Using either HTML,
JavaScript or a QTL file as an attack vector and an RTSP URL with a
long path component, a remote attacker may be able to leverage this
issue to execute arbitrary code on the remote host subject to the
user's privileges.

See also :

http://www.nessus.org/u?ebb12673
http://projects.info-pull.com/moab/MOAB-01-01-2007.html
http://docs.info.apple.com/article.html?artnum=304989
http://lists.apple.com/archives/Security-announce/2007/Jan/msg00000.html
http://secunia.com/blog/7/

Solution :

Apply Apple's Security Update 2007-001, which is available via the
'Apple Software Update' application, installed with the most recent
version of QuickTime or iTunes.

Risk factor :

Medium / CVSS Base Score : 6.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 5.9
(CVSS2#E:H/RL:OF/RC:C)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 24268 ()

Bugtraq ID: 21829

CVE ID: CVE-2007-0015

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now