QuickTime < 7.2 Security Update (Windows)

High Nessus Plugin ID 26916


The remote Windows host contains an application that allows remote code execution.


The version of QuickTime installed on the remote Windows host may allow a remote attacker to execute arbitrary code if he can trick a user on the affected system into opening a specially crafted QTL file.


Either use QuickTime's Software Update preference to upgrade to the latest version or apply Apple's Security Update for QuickTime 7.2 or later.

See Also



Plugin Details

Severity: High

ID: 26916

File Name: quicktime_72_secupd.nasl

Version: $Revision: 1.15 $

Type: local

Agent: windows

Family: Windows

Published: 2007/10/04

Modified: 2015/01/12

Dependencies: 13855, 10456, 21561

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:apple:quicktime

Required KB Items: SMB/QuickTime/Version, SMB/Registry/Enumerated

Exploit Available: false

Exploit Ease: No known exploits are available

Reference Information

CVE: CVE-2007-4673

BID: 25913

OSVDB: 40434

CWE: 78