CVE-2009-2202
Vulnerability from cvelistv5
Published
2009-09-10 21:00
Modified
2024-08-07 05:44
Severity ?
Summary
Apple QuickTime before 7.6.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted H.264 movie file.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T05:44:55.357Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.apple.com/kb/HT3859"
          },
          {
            "name": "oval:org.mitre.oval:def:5467",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5467"
          },
          {
            "name": "36328",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/36328"
          },
          {
            "name": "APPLE-SA-2009-09-09-2",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00002.html"
          },
          {
            "name": "quicktime-h264movie-code-execution(53127)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53127"
          },
          {
            "name": "ADV-2009-3184",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/3184"
          },
          {
            "name": "APPLE-SA-2009-11-09-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.apple.com/kb/HT3937"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-09-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Apple QuickTime before 7.6.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted H.264 movie file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.apple.com/kb/HT3859"
        },
        {
          "name": "oval:org.mitre.oval:def:5467",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5467"
        },
        {
          "name": "36328",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/36328"
        },
        {
          "name": "APPLE-SA-2009-09-09-2",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00002.html"
        },
        {
          "name": "quicktime-h264movie-code-execution(53127)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53127"
        },
        {
          "name": "ADV-2009-3184",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/3184"
        },
        {
          "name": "APPLE-SA-2009-11-09-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.apple.com/kb/HT3937"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-2202",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Apple QuickTime before 7.6.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted H.264 movie file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://support.apple.com/kb/HT3859",
              "refsource": "CONFIRM",
              "url": "http://support.apple.com/kb/HT3859"
            },
            {
              "name": "oval:org.mitre.oval:def:5467",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5467"
            },
            {
              "name": "36328",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/36328"
            },
            {
              "name": "APPLE-SA-2009-09-09-2",
              "refsource": "APPLE",
              "url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00002.html"
            },
            {
              "name": "quicktime-h264movie-code-execution(53127)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53127"
            },
            {
              "name": "ADV-2009-3184",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/3184"
            },
            {
              "name": "APPLE-SA-2009-11-09-1",
              "refsource": "APPLE",
              "url": "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html"
            },
            {
              "name": "http://support.apple.com/kb/HT3937",
              "refsource": "CONFIRM",
              "url": "http://support.apple.com/kb/HT3937"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-2202",
    "datePublished": "2009-09-10T21:00:00",
    "dateReserved": "2009-06-24T00:00:00",
    "dateUpdated": "2024-08-07T05:44:55.357Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2009-2202\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2009-09-10T21:30:01.047\",\"lastModified\":\"2024-11-21T01:04:22.550\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Apple QuickTime before 7.6.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted H.264 movie file.\"},{\"lang\":\"es\",\"value\":\"Apple QuickTime anterior a v7.6.4, permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n o provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria y ca\u00edda de la aplicaci\u00f3n) a trav\u00e9s de un fichero de pel\u00edcula H.264 manipulado.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:C/I:C/A:C\",\"baseScore\":9.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.6,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:*:-:mac:*:*:*:*:*\",\"versionEndIncluding\":\"7.6.1\",\"matchCriteriaId\":\"FBBE7D6D-5D75-48D9-AF41-E57D1E1B913D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:*:-:windows:*:*:*:*:*\",\"versionEndIncluding\":\"7.6.1\",\"matchCriteriaId\":\"C4D2A738-C558-4FF4-AD8B-B24213FB3A5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EE08FAE-0862-4C36-95BC-878B04CBF397\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8F310A8-F760-4059-987D-42369F360DE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:4.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F71BC599-FCBE-4F1F-AA24-41AF91F82226\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:4.1.2:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"ACE0F153-80B3-4469-AE49-4B7517218574\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:4.1.2:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"03C15EB0-1D29-4DBE-B2C0-FE9365E8D624\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41473E1D-B988-4312-B16B-D340508DD473\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:5.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCC2EBC0-F2A6-4709-9A27-CF63BC578744\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:5.0.1:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"53527707-E903-4A12-AB87-6EC5FA9F2EC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:5.0.1:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"EE3EAE38-9DE6-450D-BCD0-70E590C1F76E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:5.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"844E1B14-A13A-47F1-9C82-02EAEED1A911\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:5.0.2:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"A91242F5-485E-4125-A19C-4C20B602DD5D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:5.0.2:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"63D7214C-FAF6-4DCA-8520-8A539BDCD98A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80747BDD-70E9-4E74-896F-C79D014F1B2D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.0:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"0D02D35D-E957-4949-B5DA-F3654B13A308\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A4C6772-CD24-46FD-AEBE-BF8BB16B5BB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.0.0:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"8399665C-F8A8-4133-A0CD-E767F8266E94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.0.0:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"FC48F2B6-4BC7-4B57-ADE2-4907287A1AA0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85ADED98-62C6-4961-894C-1D26E3B3EE5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.0.1:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"F7B48C74-28CC-4348-9CF9-9AF58C7A5E72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.0.1:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"6469AEDC-6F9D-4CAC-84B2-F13107626FB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F522CEA4-B3BB-4C94-B070-6679EEA43439\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.0.2:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"904FA4B7-A6CB-48B4-B887-4B349479D1A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.0.2:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"CB2DFC1B-6452-4575-A099-2E5FD387A8AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA1E140B-BCB4-4B3C-B287-E9E944E08DB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B630944-F838-4C02-90D4-F5EB2A073CA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.1.0:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"B2FC05FE-5A85-4D78-BAAF-FFCC2CC4CAFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.1.0:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"01A24DD9-5AB8-4091-A293-1A2D7953D455\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9066C81B-A69F-450D-8606-5E29AF1AD286\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.1.1:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"BB113931-F886-425C-A0F8-171F6D71A02F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.1.1:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"D282FA67-0089-4ED5-8168-E3CE8B510BBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71285AD2-3966-4817-B630-8335BE985D56\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.2.0:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"0A2B95BD-A728-4EE7-A4C9-E1547C34E8E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.2.0:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"2B5928A2-C989-4B27-91E1-7019277B2E1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2458480E-F222-452A-AB21-933F924F8F6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.3.0:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"05AA3258-E556-4443-AF79-96882A9CF33C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.3.0:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"51292C8C-4905-4C30-B166-ACCE39D9DEE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30C83A78-6BB9-443E-B508-CC6F8D157A6E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.4.0:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"546B9E74-E86B-462B-A58E-017E3B780B63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.4.0:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"3433487A-98ED-4C28-8659-609BF395E23A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C7CB5C4-9A5A-4831-8FFD-0D261619A7DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61463F4F-BBE0-42AA-AC22-8F39E94EB520\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.5.0:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"579E49C1-2F66-4CCB-AAE4-6C15089C2D1E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.5.0:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"335F4D89-983A-4C05-937A-EEE802A260D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2CE0B67-0794-472D-A2C0-CC5CA0E36370\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.5.1:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"49477EAA-5AA2-4B55-8BEF-AB3E118DE618\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.5.1:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"7F189FAB-3BA1-4C1B-975F-E174D5CB8771\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A5DDF47-5AA5-4EE3-B12D-9218F528EFE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.5.2:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"19AAC0DE-53D7-42E4-90D2-939C5DF6F651\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.5.2:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"F7A30674-38BA-49B8-9DE0-4C9FB5A62DA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F075BA0F-4A96-4F25-AF1D-C64C7DCE1CDC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.0:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"BC1B46A6-E032-4E24-B367-F5A94E770FC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.0:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"284BAF97-86BC-4520-BAB6-D75D18FFA1DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F43E39C4-6A08-4C38-BC7D-573F40978527\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.0.0:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"04F44BB3-5221-4D8A-ABC3-C51EC76A5B2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.0.0:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"3F4075B0-0F9F-466B-8521-2156849247C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8692B488-129A-49EA-AF84-6077FCDBB898\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.0.1:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"6E0B99DA-3BDA-4848-85BB-EC0D002A73F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.0.1:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"E1B24679-4C63-4320-A79F-E19CCFA537D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.0.1:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"DF2A6BCB-108E-4226-BC31-6E0057DFB6D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1758610B-3789-489E-A751-386D605E5A08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.0.2:*:windows:*:*:*:*:*\",\"matchCriteriaId\":\"5EDE46EA-5B6A-4B59-8BAA-CD803F6D5FD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.0.2:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"D0D28529-2A0A-4398-98C2-C35BABB9373A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.0.2:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"F8BF6A6A-F734-4395-9305-2E9F52EE888F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B535737C-BF32-471C-B26A-588632FCC427\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.0.3:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"402BBD8E-4960-43C0-8D46-6F20BBA6BF2A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.0.3:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"AFCB45F3-397E-42A8-8D08-ECF667939FF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF2C61F8-B376-40F9-8677-CADCC3295915\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.0.4:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"BDBD1E93-C675-4248-ACE6-C49DBE7B3E7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.0.4:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"D5C04F70-E2E6-48F4-948D-9D0C7B2A2F3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6254BB56-5A25-49DC-A851-3CCA249BD71D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC0E0EA8-2947-44F9-BCFA-F4CFA34E9EFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.1.0:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"EA16CB14-D053-4CDB-B80A-8AC9D17FACAC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.1.0:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"E1DB3FBD-40F4-41FB-A939-3E3A4D0D85B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"795E3354-7824-4EF4-A788-3CFEB75734E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.1.1:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"60500521-46FC-4734-901C-0A5E5D3DB9EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.1.1:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"F45B47BB-E14F-4437-8828-EF059496BF95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9419A1E9-A0DA-4846-8959-BE50B53736E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.1.2:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"682C7A59-6F3C-4E50-A145-D081614CD42F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.1.2:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"9B353211-F90E-4F38-9D0B-B8C7EC00E66F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"952A8015-B18B-481C-AC17-60F0D7EEE085\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.1.3:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"D69BB04E-E696-4B34-95DE-B42F46697F9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.1.3:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"F6A44CA9-D257-4BB7-B5AB-23193F35FCB5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E518B27-A79B-43A4-AFA6-E59EF8E944D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.1.4:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"C0638BF3-4B18-4747-AD33-D04B3B4E217F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.1.4:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"9B8F4241-551B-492D-8602-06146B05CF13\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEC6EF36-93B3-49BB-9A6F-1990E3F4170E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.1.5:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"CF370413-96F7-4882-899F-577A8F3DAD47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.1.5:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"2BA9C6F7-513B-426F-90AD-7E826433CEF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A1B5F2F-CDBF-4AEF-9F78-0C010664B9E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.1.6:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"2D9ECCF0-1CF4-4201-8002-EFF6C5331DB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.1.6:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"5B709D68-8474-4AAE-AA11-777EF510E1AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98C9B657-5484-4458-861E-D6FB5019265A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B84D320E-ACA2-4B6E-B682-00202B9ADF2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.2.0:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"B2706818-E87A-4BF7-AC10-CFA28ABE4B6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.2.0:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"4DCEE583-6CD2-4098-9A2A-B006A5023318\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81E0F160-4B70-45CD-B8AC-AB30ADDB8D2D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.2.1:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"268B4FBA-D6AC-4595-898A-721E284F3399\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.2.1:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"52AD56F9-0CE6-4949-9853-3274A2C81601\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EF20D38-BFA3-4403-AB24-7B74EFD68229\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97FEBA83-C845-4334-9B9A-921BA0F44DE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.3.0:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"DA476E79-5145-4EE3-BD81-3773C6B19825\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.3.0:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"555B1A2A-95F5-4B06-8774-FF952BEC2FBB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2CE2A89-B2FC-413D-A059-526E6DE301BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.3.1:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"1BB8C8C6-2751-4704-B999-FBF5BC2FDA74\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.3.1:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"CEA210F5-71F6-4528-B2B4-507AA4A435EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.3.1.70:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F9F7DCE-EE65-4CD5-AA21-208B2AAF09EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31662D02-7FA9-4FAD-BE49-194B7295CEE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0C835F2-4F9E-45A6-8112-C2D8CB1A39AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.4.0:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"D0E4F2DB-1C1A-4440-8D1B-C18F41E2603C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.4.0:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"081712FF-C6B8-423B-8F20-C79D25DE782F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8461AF0A-D4D3-4010-A881-EDBB95003083\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.4.1:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"D7B3A3F0-EE97-49B6-A92A-D5D2D7171913\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.4.1:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"CF045B49-11A3-447A-9D05-1E8794980A81\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9E1332A-5B4D-4590-BFA5-4557C71F894B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C8E5C77-573F-4EA3-A59C-4A7B11946E93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.4.5:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"428DCE6C-B2EC-4BFF-BA65-DB14F1CC964F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.4.5:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"939BE521-A385-4A1A-B4B0-C4687751D4A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DC01580-460A-4DC3-BB6D-A9B2254EF6D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C6E08BF-737E-4512-9BB8-5B4B03A2F8B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.5.0:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"2AC5D3A0-A7BB-4C0F-94FF-8ED54FB62A51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.5.0:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"304CFC80-E925-4CB8-8251-0FD0F09B8410\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D22D0674-0EC7-4176-97FB-940F2F7D6AFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.5.5:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"4DDB8D28-183F-4B16-8610-592A210311E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.5.5:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"DFD95CD9-E387-4EC8-B6EA-FBC6961E4C8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A6470EC-B72B-404C-9E69-03C3FEFD56F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.6.0:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"6ED97A46-DE85-4019-AE15-CDFF0E1371F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.6.0:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"F3ECF41A-8B4E-4A9B-BEE7-5F0EB0ED6791\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA3FB6BA-D0FA-4DC3-8A4D-453C2EE51D09\"}]}]}],\"references\":[{\"url\":\"http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2009/Sep/msg00002.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT3859\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT3937\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/36328\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/3184\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/53127\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5467\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2009/Sep/msg00002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT3859\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT3937\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/36328\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/3184\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/53127\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5467\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.