QuickTime < 7.6.8 Multiple Vulnerabilities (Windows)

High Log Correlation Engine Plugin ID 801185


The remote host contains an application that is vulnerable to multiple attack vectors.


Versions of QuickTime earlier than 7.6.8 are potentially affected by multiple vulnerabilities :

An input validation issue in the QTPlugin.ocx ActiveX control could allow an attacker to force the application to jump to a location in memory controlled by the attacker through the optional '_Marshaled_pUnk' parameter and in turn to execute remote code under the context of the user running the web browser. (CVE-2010-1818)

- QuickTime Picture Viewer uses a fixed path to look for specific files or libraries, such as 'cfnetwork.dll' and 'corefoundation.dll', and this path includes directories that may not be trusted or under user control. If an attacker places a maliciously crafted DLL in the same directory as an image file, opening the image file with QuickTime Picture Viewer will cause the malicious DLL to be loaded. (CVE-2010-1819)


Upgrade to QuickTime 7.6.8 or later.

See Also






Plugin Details

Severity: High

ID: 801185

File Name: 801185.prm

Family: Web Clients

Published: 2010/09/16

Nessus ID: 49260

Risk Information

Risk Factor: High


Base Score: 6.8

Temporal Score: 5.6

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

Patch Publication Date: 2010/09/15

Vulnerability Publication Date: 2010/08/30

Exploitable With


Metasploit (Apple QuickTime 7.6.7 _Marshaled_pUnk Code Execution)

Reference Information

CVE: CVE-2010-1818, CVE-2010-1819

BID: 42774, 42841