QuickTime < 7.2 Security Update (Windows)

high Nessus Plugin ID 26916

Synopsis

The remote Windows host contains an application that allows remote code execution.

Description

The version of QuickTime installed on the remote Windows host may allow a remote attacker to execute arbitrary code if he can trick a user on the affected system into opening a specially crafted QTL file.

Solution

Either use QuickTime's Software Update preference to upgrade to the latest version or apply Apple's Security Update for QuickTime 7.2 or later.

See Also

https://support.apple.com/?artnum=306560

https://lists.apple.com/archives/security-announce/2007/Oct/msg00000.html

Plugin Details

Severity: High

ID: 26916

File Name: quicktime_72_secupd.nasl

Version: 1.17

Type: local

Agent: windows

Family: Windows

Published: 10/4/2007

Updated: 11/15/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:apple:quicktime

Required KB Items: SMB/QuickTime/Version, SMB/Registry/Enumerated

Exploit Ease: No known exploits are available

Reference Information

CVE: CVE-2007-4673

BID: 25913

CWE: 78