QuickTime < 7.7.6 Multiple Vulnerabilities (Windows)

This script is Copyright (C) 2014-2015 Tenable Network Security, Inc.


Synopsis :

The remote Windows host contains an application that is affected by
multiple vulnerabilities.

Description :

The version of Apple QuickTime installed on the remote Windows host is
prior to 7.7.6. It is, therefore, affected by the following
vulnerabilities :

- A memory corruption flaw exists when handling specially
crafted RLE encoded videos due to user-supplied input
not being properly sanitized. (CVE-2014-1391)

- A buffer overflow flaw exists when parsing specially
crafted MIDI files due to user-supplied input not being
properly validated. (CVE-2014-4350)

- A buffer overflow flaw exists when parsing specially
crafted M4A files due to user-supplied input not being
properly validated. (CVE-2014-4351)

- A memory corruption flaw exists in the mvhd atom when
handling malformed version numbers and flags due to not
properly sanitizing user-supplied input. (CVE-2014-4979)

Successful exploitation of these issues by a remote attacker can
result in program termination or arbitrary code execution, subject to
the user's privileges.

See also :

https://support.apple.com/kb/HT6493
http://www.securityfocus.com/archive/1/533790/30/0/threaded

Solution :

Upgrade to QuickTime 7.7.6 or later.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.1
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false

Family: Windows

Nessus Plugin ID: 78678 ()

Bugtraq ID: 68852
69907
69908
70643

CVE ID: CVE-2014-1391
CVE-2014-4350
CVE-2014-4351
CVE-2014-4979

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now