QuickTime < 7.6.8 Multiple Vulnerabilities (Windows)
High Nessus Plugin ID 49260
SynopsisThe remote Windows host contains an application that is affected by two vulnerabilities.
DescriptionThe version of QuickTime installed on the remote Windows host is older than 7.6.8. Such versions are reportedly affected by two vulnerabilities :
- An input validation issue in the QTPlugin.ocx ActiveX control could allow an attacker to force the application to jump to a location in memory controlled by the attacker through the optional '_Marshaled_pUnk' parameter and in turn to execute remote code under the context of the user running the web browser. (CVE-2010-1818)
- QuickTime Picture Viewer uses a fixed path to look for specific files or libraries, such as 'cfnetwork.dll' and 'corefoundation.dll', and this path includes directories that may not be trusted or under user control. If an attacker places a maliciously crafted DLL in the same directory as an image file, opening the image file with QuickTime Picture Viewer will cause the malicious DLL to be loaded. (CVE-2010-1819)
SolutionUpgrade to QuickTime 7.6.8 or later.