ID CVE-2010-0527
Summary Integer overflow in Apple QuickTime before 7.6.6 on Windows allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted PICT image. Per: http://lists.apple.com/archives/security-announce/2010//Mar/msg00002.html 'This issue does not affect Mac OS X systems'
References
Vulnerable Configurations
  • cpe:2.3:a:apple:quicktime:7.0.0:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:7.0.0:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:7.0.1:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:7.0.1:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:7.0.2:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:7.0.2:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:7.0.3:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:7.0.3:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:7.0.4:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:7.0.4:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:7.1.0:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:7.1.0:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:7.1.1:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:7.1.1:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:7.1.2:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:7.1.2:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:7.1.3:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:7.1.3:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:7.1.4:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:7.1.4:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:7.1.5:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:7.1.5:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:7.1.6:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:7.1.6:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:7.2.0:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:7.2.0:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:7.2.1:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:7.2.1:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:7.3.0:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:7.3.0:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:7.3.1:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:7.3.1:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:7.4.0:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:7.4.0:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:7.4.1:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:7.4.1:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:7.4.5:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:7.4.5:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:7.5.0:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:7.5.0:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:7.5.5:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:7.5.5:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:5.0.2:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:5.0.2:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:6.0:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:6.0:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:6.0.0:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:6.0.0:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:6.0.1:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:6.0.1:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:6.0.2:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:6.0.2:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:6.1.0:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:6.1.0:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:6.1.1:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:6.1.1:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:6.2.0:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:6.2.0:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:6.3.0:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:6.3.0:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:6.4.0:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:6.4.0:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:6.5.0:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:6.5.0:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:6.5.1:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:6.5.1:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:quicktime:6.5.2:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:quicktime:6.5.2:-:windows:*:*:*:*:*
  • cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*
    cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*
  • cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*
    cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*
  • cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*
    cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*
CVSS
Base: 9.3 (as of 19-09-2017 - 01:30)
Impact:
Exploitability:
CWE CWE-189
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:N/AC:M/Au:N/C:C/I:C/A:C
oval via4
accepted 2013-07-29T04:01:55.163-04:00
class vulnerability
contributors
  • name J. Daniel Brown
    organization DTCC
  • name Shane Shaffer
    organization G2, Inc.
  • name Shane Shaffer
    organization G2, Inc.
  • name Maria Kedovskaya
    organization ALTX-SOFT
definition_extensions
comment Apple QuickTime is installed
oval oval:org.mitre.oval:def:12443
description Integer overflow in Apple QuickTime before 7.6.6 on Windows allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted PICT image.
family windows
id oval:org.mitre.oval:def:7458
status accepted
submitted 2010-04-06T10:30:00.000-05:00
title Apple QuickTime Before 7.6.6 PICT Image Handling Integer Overflow Vulnerability
version 10
refmap via4
apple APPLE-SA-2010-03-30-1
Last major update 19-09-2017 - 01:30
Published 31-03-2010 - 18:30
Last modified 19-09-2017 - 01:30
Back to Top