QuickTime < 7.1.6 Multiple Vulnerabilities

Medium Nessus Network Monitor Plugin ID 3975


The remote host is vulnerable to multiple buffer overflows.


According to its version, the installation of QuickTime on the remote Windows host is affected by a flaw in the way that it handles malformed Java byte code. An attacker exploiting this flaw would need to be able to convince a user to browse to a malicious site. Further, the browser must be Java-enabled and have a vulnerable version of QuickTime installed. Successful exploitation would result in the attacker executing arbitrary code on the client system. In addition, this version of QuickTime is vulnerable to an integer overflow and a heap overflow. An attacker exploiting either of these flaws will be able to execute code on the remote machine.


Upgrade to version 7.1.6 or higher.

See Also


Plugin Details

Severity: Medium

ID: 3975

File Name: 3975.prm

Family: Web Clients

Published: 2007/04/24

Modified: 2016/01/21

Dependencies: 1735, 8314

Risk Information

Risk Factor: Medium


Base Score: 5.4

Temporal Score: 4

Vector: CVSS2#AV:A/AC:M/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C


Base Score: 5

Temporal Score: 4.4


Temporal Vector: CVSS3#E:U/RL:O/RC:C

Exploitable With

Metasploit (Apple QTJava toQTPointer() Arbitrary Memory Access)

Reference Information

CVE: CVE-2007-2295, CVE-2007-2296

BID: 23650, 23652, 23608

OSVDB: 35577, 35578