ID CVE-2007-0754
Summary Heap-based buffer overflow in Apple QuickTime before 7.1.3 allows user-assisted remote attackers to execute arbitrary code via a crafted Sample Table Sample Descriptor (STSD) atom size in a QuickTime movie. This vulnerability is addressed in the following product release: Apple, QuickTime, 7.1.3
References
Vulnerable Configurations
  • cpe:2.3:a:apple:quicktime:-:*:*:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:-:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:3:*:*:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:3:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:3.0:*:*:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:4.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:4.1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:5.0:*:*:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:5.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:5.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:5.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:5.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:5.0.2:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:5.0.2:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:6.0:*:*:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:6.0:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:6.0:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:6.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:6.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:6.0.0:-:mac:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:6.0.0:-:mac:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:6.0.0:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:6.0.0:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:6.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:6.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:6.0.1:-:mac:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:6.0.1:-:mac:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:6.0.1:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:6.0.1:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:6.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:6.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:6.0.2:-:mac:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:6.0.2:-:mac:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:6.0.2:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:6.0.2:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:6.1:*:*:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:6.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:6.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:6.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:6.1.0:-:mac:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:6.1.0:-:mac:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:6.1.0:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:6.1.0:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:6.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:6.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:6.1.1:-:mac:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:6.1.1:-:mac:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:6.1.1:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:6.1.1:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:6.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:6.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:6.2.0:-:mac:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:6.2.0:-:mac:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:6.2.0:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:6.2.0:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:6.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:6.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:6.3.0:-:mac:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:6.3.0:-:mac:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:6.3.0:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:6.3.0:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:6.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:6.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:6.4.0:-:mac:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:6.4.0:-:mac:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:6.4.0:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:6.4.0:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:6.5:*:*:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:6.5:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:6.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:6.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:6.5.0:-:mac:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:6.5.0:-:mac:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:6.5.0:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:6.5.0:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:6.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:6.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:6.5.1:-:mac:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:6.5.1:-:mac:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:6.5.1:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:6.5.1:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:6.5.2:*:*:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:6.5.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:6.5.2:-:mac:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:6.5.2:-:mac:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:6.5.2:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:6.5.2:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:7.0:*:*:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:7.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:7.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:7.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:7.0.0:-:mac:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:7.0.0:-:mac:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:7.0.0:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:7.0.0:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:7.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:7.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:7.0.1:-:mac:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:7.0.1:-:mac:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:7.0.1:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:7.0.1:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:7.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:7.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:7.0.2:-:mac:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:7.0.2:-:mac:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:7.0.2:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:7.0.2:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:7.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:7.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:7.0.3:-:mac:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:7.0.3:-:mac:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:7.0.3:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:7.0.3:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:7.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:7.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:7.0.4:-:mac:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:7.0.4:-:mac:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:7.0.4:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:7.0.4:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:7.0.8:*:*:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:7.0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:7.1:*:*:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:7.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:7.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:7.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:7.1.0:-:mac:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:7.1.0:-:mac:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:7.1.0:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:7.1.0:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:7.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:7.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:7.1.1:-:mac:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:7.1.1:-:mac:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:7.1.1:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:7.1.1:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:7.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:7.1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:7.1.2:-:mac:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:7.1.2:-:mac:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:7.1.2:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:7.1.2:-:windows:*:*:*:*:*
CVSS
Base: 9.3 (as of 16-10-2018 - 16:34)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:N/AC:M/Au:N/C:C/I:C/A:C
refmap via4
bid 23923
bugtraq 20070511 TPTI-07-07: Apple QuickTime STSD Parsing Heap Overflow Vulnerability
confirm http://docs.info.apple.com/article.html?artnum=304357
misc http://dvlabs.tippingpoint.com/advisory/TPTI-07-07
osvdb 35574
sreason 2703
xf quicktime-stsd-bo(34244)
Last major update 16-10-2018 - 16:34
Published 14-05-2007 - 21:19
Last modified 16-10-2018 - 16:34
Back to Top