QuickTime < 7.6.8 Multiple Vulnerabilities (Windows)

High Nessus Plugin ID 49260


The remote Windows host contains an application that is affected by two vulnerabilities.


The version of QuickTime installed on the remote Windows host is older than 7.6.8. Such versions are reportedly affected by two vulnerabilities :

- An input validation issue in the QTPlugin.ocx ActiveX control could allow an attacker to force the application to jump to a location in memory controlled by the attacker through the optional '_Marshaled_pUnk' parameter and in turn to execute remote code under the context of the user running the web browser. (CVE-2010-1818)

- QuickTime Picture Viewer uses a fixed path to look for specific files or libraries, such as 'cfnetwork.dll' and 'corefoundation.dll', and this path includes directories that may not be trusted or under user control. If an attacker places a maliciously crafted DLL in the same directory as an image file, opening the image file with QuickTime Picture Viewer will cause the malicious DLL to be loaded. (CVE-2010-1819)


Upgrade to QuickTime 7.6.8 or later.

See Also






Plugin Details

Severity: High

ID: 49260

File Name: quicktime_768.nasl

Version: $Revision: 1.12 $

Type: local

Agent: windows

Family: Windows

Published: 2010/09/16

Modified: 2016/11/23

Dependencies: 21561

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 7.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:apple:quicktime

Required KB Items: SMB/QuickTime/Version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2010/09/15

Vulnerability Publication Date: 2010/08/30

Exploitable With


Core Impact

Metasploit (Apple QuickTime 7.6.7 _Marshaled_pUnk Code Execution)

Reference Information

CVE: CVE-2010-1818, CVE-2010-1819

BID: 42774, 42841

OSVDB: 67591, 67705