QuickTime < 7.3.1 Multiple Vulnerabilities (Mac OS X)

high Nessus Plugin ID 29699

Synopsis

The remote Mac OS X host contains an application that is affected by multiple vulnerabilities.

Description

The version of QuickTime installed on the remote Mac OS X host is older than 7.3.1. Such versions contain several vulnerabilities that may allow an attacker to execute arbitrary code on the remote host if he can trick the user to open a specially crafted RTSP movie, QTL file, or Flash media file with QuickTime.

Solution

Either use QuickTime's Software Update preference to upgrade to the latest version or manually upgrade to QuickTime 7.3.1 or later.

See Also

http://docs.info.apple.com/article.html?artnum=307176

http://lists.apple.com/archives/security-announce/2007/Dec/msg00000.html

Plugin Details

Severity: High

ID: 29699

File Name: macosx_Quicktime731.nasl

Version: 1.19

Type: local

Agent: macosx

Published: 12/14/2007

Updated: 7/14/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.4

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:apple:quicktime

Required KB Items: MacOSX/QuickTime/Version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 12/13/2007

Exploitable With

CANVAS (CANVAS)

Core Impact

Metasploit (Apple QuickTime 7.3 RTSP Response Header Buffer Overflow)

Reference Information

CVE: CVE-2007-4706, CVE-2007-4707, CVE-2007-6166

BID: 26549, 26866, 26868

CWE: 119