QuickTime < 7.1.6 Multiple Vulnerabilities

Medium Nessus Network Monitor Plugin ID 3975

Synopsis

The remote host is vulnerable to multiple buffer overflows.

Description

According to its version, the installation of QuickTime on the remote Windows host is affected by a flaw in the way that it handles malformed Java byte code. An attacker exploiting this flaw would need to be able to convince a user to browse to a malicious site. Further, the browser must be Java-enabled and have a vulnerable version of QuickTime installed. Successful exploitation would result in the attacker executing arbitrary code on the client system. In addition, this version of QuickTime is vulnerable to an integer overflow and a heap overflow. An attacker exploiting either of these flaws will be able to execute code on the remote machine.

Solution

Upgrade to version 7.1.6 or higher.

See Also

http://www.matasano.com/log/812/breaking-macbook-vuln-in-quicktime-affects-win32-apple-code

Plugin Details

Severity: Medium

ID: 3975

File Name: 3975.prm

Family: Web Clients

Published: 2007/04/24

Modified: 2016/01/21

Dependencies: 1735, 8314

Risk Information

Risk Factor: Medium

CVSSv2

Base Score: 5.4

Temporal Score: 4

Vector: CVSS2#AV:A/AC:M/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

CVSSv3

Base Score: 5

Temporal Score: 4.4

Vector: CVSS3#AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS3#E:U/RL:O/RC:C

Exploitable With

Metasploit (Apple QTJava toQTPointer() Arbitrary Memory Access)

Reference Information

CVE: CVE-2007-2295, CVE-2007-2296

BID: 23650, 23652, 23608

OSVDB: 35577, 35578