Synopsis
The remote Windows host contains an application that may be affected by multiple vulnerabilities.
Description
The version of QuickTime installed on the remote Windows host is older than 7.7.  As such, it reportedly may be affected by the following vulnerabilities :
  - A buffer overflow in QuickTime's handling of pict files     may lead to an application crash or arbitrary code     execution. (CVE-2011-0245)
  - A buffer overflow in QuickTime's handling of JPEG2000     files may lead to an application crash or arbitrary     code execution. (CVE-2011-0186)
  - A cross-origin issue in QuickTime plug-in's handling of     cross-site redirects may lead to disclosure of video     data from another site. (CVE-2011-0187)
  - An integer overflow in QuickTime's handling of RIFF WAV     files may lead to an application crash or arbitrary     code execution. (CVE-2011-0209)
  - A memory corruption issue in QuickTime's handling of     sample tables in QuickTime movie files may lead to an     application crash or arbitrary code execution.
    (CVE-2011-0210)
  - An integer overflow in QuickTime's handling of audio     channels in movie files may lead to an application     crash or arbitrary code execution. (CVE-2011-0211)
  - A buffer overflow in QuickTime's handling of JPEG files     may lead to an application crash or arbitrary code     execution. (CVE-2011-0213)
  - A heap-based buffer overflow in QuickTime's handling of     GIF files may lead to an application crash or arbitrary     code execution. (CVE-2011-0246)
  - Multiple stack-based buffer overflows in QuickTime's     handling of H.264 encoded movie files may lead to an     application crash or arbitrary code execution.
    (CVE-2011-0247)
  - A stack-based buffer overflow in the QuickTime ActiveX's     handling of QTL files may lead to an application crash     or arbitrary code execution. (CVE-2011-0248)
  - A heap-based buffer overflow in QuickTime's handling of     STSC atoms in QuickTime movie files may lead to an     application crash or arbitrary code execution.
    (CVE-2011-0249)
  - A heap-based buffer overflow in QuickTime's handling of     STSS atoms in QuickTime movie files may lead to an     application crash or arbitrary code execution.
    (CVE-2011-0250)
  - A heap-based buffer overflow in QuickTime's handling of     STSZ atoms in QuickTime movie files may lead to an     application crash or arbitrary code execution.
    (CVE-2011-0251)
  - A heap-based buffer overflow in QuickTime's handling of     STTS atoms in QuickTime movie files may lead to an     application crash or arbitrary code execution.
    (CVE-2011-0252)
  - A stack-based buffer overflow in QuickTime's handling of     PICT files may lead to an application crash or arbitrary     code execution. (CVE-2011-0257)
  - An integer overflow in QuickTime's handling of track run     atoms in QuickTime movie files may lead to an     application crash or arbitrary code execution.
    (CVE-2011-0256)
  - Memory corruption in Quicktime's handling of mp4v codec     information. (CVE-2011-0258)
Solution
Upgrade to QuickTime 7.7 or later.
Plugin Details
File Name: quicktime_77.nasl
Agent: windows
Supported Sensors: Nessus Agent, Nessus
Risk Information
Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C
Vulnerability Information
CPE: cpe:/a:apple:quicktime
Required KB Items: SMB/QuickTime/Version
Exploit Ease: Exploits are available
Patch Publication Date: 8/3/2011
Vulnerability Publication Date: 6/23/2011
Exploitable With
CANVAS (White_Phosphorus)
Core Impact
Metasploit (Apple QuickTime PICT PnSize Buffer Overflow)
Reference Information
CVE: CVE-2011-0186, CVE-2011-0187, CVE-2011-0209, CVE-2011-0210, CVE-2011-0211, CVE-2011-0213, CVE-2011-0245, CVE-2011-0246, CVE-2011-0247, CVE-2011-0248, CVE-2011-0249, CVE-2011-0250, CVE-2011-0251, CVE-2011-0252, CVE-2011-0256, CVE-2011-0257, CVE-2011-0258
BID: 46992, 46995, 48419, 48420, 48430, 48442, 49028, 49029, 49030, 49031, 49034, 49035, 49036, 49038, 49144, 49170, 49396