Quicktime < 7.1.6 quicktime.util.QTHandleRef toQTPointer Method Arbitrary Code Execution (Mac OS X)

High Nessus Plugin ID 25122


The remote Mac OS X host contains an application that is prone to multiple attacks.


According to its version, the installation of Quicktime on the remote Mac OS X host which contains a bug which might allow a rogue Java program to write anywhere in the heap.

An attacker may be able to leverage these issues to execute arbitrary code on the remote host by luring a victim into visiting a rogue page containing a malicious Java applet.


Upgrade to Quicktime version 7.1.6 or later.

See Also


Plugin Details

Severity: High

ID: 25122

File Name: macosx_Quicktime716.nasl

Version: $Revision: 1.11 $

Type: local

Agent: macosx

Published: 2007/05/02

Modified: 2013/03/04

Dependencies: 15573

Risk Information

Risk Factor: High


Base Score: 7.6

Temporal Score: 6.3

Vector: CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:apple:quicktime

Required KB Items: MacOSX/QuickTime/Version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2007/05/01

Vulnerability Publication Date: 2007/04/24

Exploitable With

Core Impact

Metasploit (Apple QTJava toQTPointer() Arbitrary Memory Access)

Reference Information

CVE: CVE-2007-2175

BID: 23608

OSVDB: 34178