var-200703-0009
Vulnerability from variot
Integer overflow in Apple QuickTime before 7.1.5, when installed on Windows operating systems, allows remote user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted 3GP video file. The Apple QuickTime player contains a heap buffer overflow vulnerability. This vulnerability may allow an attacker to execute arbitrary code or create a denial-of-service condition. Apple QuickTime is prone to multiple unspecified remote code-execution vulnerabilities including mulitple heap and stack-based buffer-overflow and integer-overflow issues. These issues arise when the application handles specially crafted 3GP, MIDI, MOV, PICT, and QTIF files. Successful attacks can result in the compromise of the applicaiton or can cause denial-of-service conditions. Few details regarding these issues are currently available. Separate BIDs for each issue will be created as new information becomes available. QuickTime versions prior to 7.1.5 are vulnerable. Apple QuickTime is a popular multimedia player that supports a wide variety of media formats. There are multiple buffer overflow vulnerabilities in QuickTime's processing of various media formats. Remote attackers may exploit these vulnerabilities to control the user's machine by enticing the user to open and process malformed media files. An integer overflow exists in QuickTime's handling of 3GP video files. If a user is tricked into opening a malicious movie, this overflow could be triggered, resulting in a denial of service or arbitrary code execution. (CVE-2007-0711)
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-200703-0009",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": null,
"scope": null,
"trust": 6.4,
"vendor": "apple computer",
"version": null
},
{
"model": "quicktime",
"scope": "eq",
"trust": 1.6,
"vendor": "apple",
"version": "7.0.4"
},
{
"model": "quicktime",
"scope": "eq",
"trust": 1.6,
"vendor": "apple",
"version": "7.1.2"
},
{
"model": "quicktime",
"scope": "eq",
"trust": 1.6,
"vendor": "apple",
"version": "7.0.1"
},
{
"model": "quicktime",
"scope": "eq",
"trust": 1.6,
"vendor": "apple",
"version": "7.0.2"
},
{
"model": "quicktime",
"scope": "eq",
"trust": 1.6,
"vendor": "apple",
"version": "7.0.3"
},
{
"model": "quicktime",
"scope": "eq",
"trust": 1.6,
"vendor": "apple",
"version": "6.0"
},
{
"model": "quicktime",
"scope": "eq",
"trust": 1.6,
"vendor": "apple",
"version": "7.1.3"
},
{
"model": "quicktime",
"scope": "eq",
"trust": 1.6,
"vendor": "apple",
"version": "7.0"
},
{
"model": "quicktime",
"scope": "eq",
"trust": 1.6,
"vendor": "apple",
"version": "4.1.2"
},
{
"model": "quicktime",
"scope": "eq",
"trust": 1.0,
"vendor": "apple",
"version": "5.0.1"
},
{
"model": "quicktime",
"scope": "eq",
"trust": 1.0,
"vendor": "apple",
"version": "5.0.2"
},
{
"model": "quicktime",
"scope": "eq",
"trust": 1.0,
"vendor": "apple",
"version": "6.4.0"
},
{
"model": "quicktime",
"scope": "eq",
"trust": 1.0,
"vendor": "apple",
"version": "6.5.1"
},
{
"model": "quicktime",
"scope": "eq",
"trust": 1.0,
"vendor": "apple",
"version": "6.2.0"
},
{
"model": "quicktime",
"scope": "eq",
"trust": 1.0,
"vendor": "apple",
"version": "6.5.0"
},
{
"model": "quicktime",
"scope": "eq",
"trust": 1.0,
"vendor": "apple",
"version": "7.1.0"
},
{
"model": "quicktime",
"scope": "eq",
"trust": 1.0,
"vendor": "apple",
"version": "7.1.1"
},
{
"model": "quicktime",
"scope": "eq",
"trust": 1.0,
"vendor": "apple",
"version": "6.0.0"
},
{
"model": "quicktime",
"scope": "eq",
"trust": 1.0,
"vendor": "apple",
"version": "6.0.1"
},
{
"model": "quicktime",
"scope": "eq",
"trust": 1.0,
"vendor": "apple",
"version": "7.0.0"
},
{
"model": "quicktime",
"scope": "eq",
"trust": 1.0,
"vendor": "apple",
"version": "3.0"
},
{
"model": "quicktime",
"scope": "eq",
"trust": 1.0,
"vendor": "apple",
"version": "6.1.1"
},
{
"model": "quicktime",
"scope": "eq",
"trust": 1.0,
"vendor": "apple",
"version": "6.1.0"
},
{
"model": "quicktime",
"scope": "eq",
"trust": 1.0,
"vendor": "apple",
"version": "6.3.0"
},
{
"model": "quicktime",
"scope": "eq",
"trust": 1.0,
"vendor": "apple",
"version": "6.5.2"
},
{
"model": "quicktime",
"scope": "lte",
"trust": 1.0,
"vendor": "apple",
"version": "7.1.4"
},
{
"model": "quicktime",
"scope": "eq",
"trust": 1.0,
"vendor": "apple",
"version": "6.0.2"
},
{
"model": "quicktime",
"scope": "lte",
"trust": 0.8,
"vendor": "apple",
"version": "7.1.4 (windows edition only )"
},
{
"model": "quicktime",
"scope": "eq",
"trust": 0.6,
"vendor": "apple",
"version": "7.1.4"
},
{
"model": "quicktime player",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "7.1.4"
},
{
"model": "quicktime player",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "7.1.3"
},
{
"model": "quicktime player",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "7.1.2"
},
{
"model": "quicktime player",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "7.1.1"
},
{
"model": "quicktime player",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "7.0.4"
},
{
"model": "quicktime player",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "7.0.3"
},
{
"model": "quicktime player",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "7.0.2"
},
{
"model": "quicktime player",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "7.0.1"
},
{
"model": "quicktime player",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "7.0"
},
{
"model": "quicktime player",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "6.5.2"
},
{
"model": "quicktime player",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "6.5.1"
},
{
"model": "quicktime player",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "6.5"
},
{
"model": "quicktime player",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "6.1"
},
{
"model": "quicktime player",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "5.0.2"
},
{
"model": "quicktime player",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "7.1"
},
{
"model": "quicktime player",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "6"
},
{
"model": "quicktime player",
"scope": "ne",
"trust": 0.3,
"vendor": "apple",
"version": "7.1.5"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#568689"
},
{
"db": "CERT/CC",
"id": "VU#880561"
},
{
"db": "CERT/CC",
"id": "VU#822481"
},
{
"db": "CERT/CC",
"id": "VU#861817"
},
{
"db": "CERT/CC",
"id": "VU#448745"
},
{
"db": "CERT/CC",
"id": "VU#313225"
},
{
"db": "CERT/CC",
"id": "VU#410993"
},
{
"db": "CERT/CC",
"id": "VU#642433"
},
{
"db": "BID",
"id": "22827"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-000191"
},
{
"db": "CNNVD",
"id": "CNNVD-200703-173"
},
{
"db": "NVD",
"id": "CVE-2007-0711"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:apple:quicktime",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2007-000191"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "JJ Reyes\nMike Price\niotr Bania\nArtur Ogloza\nPiotr Bania\u203b bania.piotr@gmail.com\u203bSowhat\u203b smaillist@gmail.com\u203bhttp://www.zerodayinitiative.com/",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200703-173"
}
],
"trust": 0.6
},
"cve": "CVE-2007-0711",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 8.6,
"id": "CVE-2007-0711",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 1.0,
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "High",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 7.6,
"confidentialityImpact": "Complete",
"exploitabilityScore": null,
"id": "CVE-2007-0711",
"impactScore": null,
"integrityImpact": "Complete",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 8.6,
"id": "VHN-24073",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2007-0711",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "CARNEGIE MELLON",
"id": "VU#568689",
"trust": 0.8,
"value": "16.20"
},
{
"author": "CARNEGIE MELLON",
"id": "VU#880561",
"trust": 0.8,
"value": "6.64"
},
{
"author": "CARNEGIE MELLON",
"id": "VU#822481",
"trust": 0.8,
"value": "9.00"
},
{
"author": "CARNEGIE MELLON",
"id": "VU#861817",
"trust": 0.8,
"value": "17.36"
},
{
"author": "CARNEGIE MELLON",
"id": "VU#448745",
"trust": 0.8,
"value": "4.81"
},
{
"author": "CARNEGIE MELLON",
"id": "VU#313225",
"trust": 0.8,
"value": "17.72"
},
{
"author": "CARNEGIE MELLON",
"id": "VU#410993",
"trust": 0.8,
"value": "16.20"
},
{
"author": "CARNEGIE MELLON",
"id": "VU#642433",
"trust": 0.8,
"value": "16.20"
},
{
"author": "NVD",
"id": "CVE-2007-0711",
"trust": 0.8,
"value": "High"
},
{
"author": "CNNVD",
"id": "CNNVD-200703-173",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-24073",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#568689"
},
{
"db": "CERT/CC",
"id": "VU#880561"
},
{
"db": "CERT/CC",
"id": "VU#822481"
},
{
"db": "CERT/CC",
"id": "VU#861817"
},
{
"db": "CERT/CC",
"id": "VU#448745"
},
{
"db": "CERT/CC",
"id": "VU#313225"
},
{
"db": "CERT/CC",
"id": "VU#410993"
},
{
"db": "CERT/CC",
"id": "VU#642433"
},
{
"db": "VULHUB",
"id": "VHN-24073"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-000191"
},
{
"db": "CNNVD",
"id": "CNNVD-200703-173"
},
{
"db": "NVD",
"id": "CVE-2007-0711"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Integer overflow in Apple QuickTime before 7.1.5, when installed on Windows operating systems, allows remote user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted 3GP video file. The Apple QuickTime player contains a heap buffer overflow vulnerability. This vulnerability may allow an attacker to execute arbitrary code or create a denial-of-service condition. Apple QuickTime is prone to multiple unspecified remote code-execution vulnerabilities including mulitple heap and stack-based buffer-overflow and integer-overflow issues. \nThese issues arise when the application handles specially crafted 3GP, MIDI, MOV, PICT, and QTIF files. Successful attacks can result in the compromise of the applicaiton or can cause denial-of-service conditions. \nFew details regarding these issues are currently available. Separate BIDs for each issue will be created as new information becomes available. \nQuickTime versions prior to 7.1.5 are vulnerable. Apple QuickTime is a popular multimedia player that supports a wide variety of media formats. There are multiple buffer overflow vulnerabilities in QuickTime\u0027s processing of various media formats. Remote attackers may exploit these vulnerabilities to control the user\u0027s machine by enticing the user to open and process malformed media files. An integer overflow exists in QuickTime\u0027s handling of 3GP video files. If a user is tricked into opening a malicious movie, this overflow could be triggered, resulting in a denial of service or arbitrary code execution. (CVE-2007-0711)",
"sources": [
{
"db": "NVD",
"id": "CVE-2007-0711"
},
{
"db": "CERT/CC",
"id": "VU#568689"
},
{
"db": "CERT/CC",
"id": "VU#880561"
},
{
"db": "CERT/CC",
"id": "VU#822481"
},
{
"db": "CERT/CC",
"id": "VU#861817"
},
{
"db": "CERT/CC",
"id": "VU#448745"
},
{
"db": "CERT/CC",
"id": "VU#313225"
},
{
"db": "CERT/CC",
"id": "VU#410993"
},
{
"db": "CERT/CC",
"id": "VU#642433"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-000191"
},
{
"db": "BID",
"id": "22827"
},
{
"db": "VULHUB",
"id": "VHN-24073"
}
],
"trust": 7.74
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "BID",
"id": "22827",
"trust": 9.2
},
{
"db": "SECUNIA",
"id": "24359",
"trust": 8.9
},
{
"db": "SECTRACK",
"id": "1017725",
"trust": 8.1
},
{
"db": "AUSCERT",
"id": "AL-2007.0031",
"trust": 6.4
},
{
"db": "CERT/CC",
"id": "VU#568689",
"trust": 3.6
},
{
"db": "NVD",
"id": "CVE-2007-0711",
"trust": 2.8
},
{
"db": "USCERT",
"id": "TA07-065A",
"trust": 2.8
},
{
"db": "VUPEN",
"id": "ADV-2007-0825",
"trust": 1.7
},
{
"db": "OSVDB",
"id": "33905",
"trust": 1.7
},
{
"db": "XF",
"id": "32814",
"trust": 1.4
},
{
"db": "CERT/CC",
"id": "VU#880561",
"trust": 1.1
},
{
"db": "CERT/CC",
"id": "VU#822481",
"trust": 1.1
},
{
"db": "CERT/CC",
"id": "VU#861817",
"trust": 1.1
},
{
"db": "CERT/CC",
"id": "VU#448745",
"trust": 1.1
},
{
"db": "CERT/CC",
"id": "VU#313225",
"trust": 1.1
},
{
"db": "CERT/CC",
"id": "VU#410993",
"trust": 1.1
},
{
"db": "CERT/CC",
"id": "VU#642433",
"trust": 1.1
},
{
"db": "BID",
"id": "22843",
"trust": 0.8
},
{
"db": "BID",
"id": "22844",
"trust": 0.8
},
{
"db": "ZDI",
"id": "ZDI-07-010",
"trust": 0.8
},
{
"db": "USCERT",
"id": "SA07-065A",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2007-000191",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-200703-173",
"trust": 0.7
},
{
"db": "XF",
"id": "3",
"trust": 0.6
},
{
"db": "CERT/CC",
"id": "TA07-065A",
"trust": 0.6
},
{
"db": "APPLE",
"id": "APPLE-SA-2007-03-05",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-24073",
"trust": 0.1
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#568689"
},
{
"db": "CERT/CC",
"id": "VU#880561"
},
{
"db": "CERT/CC",
"id": "VU#822481"
},
{
"db": "CERT/CC",
"id": "VU#861817"
},
{
"db": "CERT/CC",
"id": "VU#448745"
},
{
"db": "CERT/CC",
"id": "VU#313225"
},
{
"db": "CERT/CC",
"id": "VU#410993"
},
{
"db": "CERT/CC",
"id": "VU#642433"
},
{
"db": "VULHUB",
"id": "VHN-24073"
},
{
"db": "BID",
"id": "22827"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-000191"
},
{
"db": "CNNVD",
"id": "CNNVD-200703-173"
},
{
"db": "NVD",
"id": "CVE-2007-0711"
}
]
},
"id": "VAR-200703-0009",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-24073"
}
],
"trust": 0.01
},
"last_update_date": "2024-11-29T21:52:49.566000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "QuickTime 7.1.5 for Windows",
"trust": 0.8,
"url": "http://www.apple.com/support/downloads/quicktime715forwindows.html"
},
{
"title": "QuickTime 7.1.5",
"trust": 0.8,
"url": "http://docs.info.apple.com/article.html?artnum=305149"
},
{
"title": "QuickTime 7.1.5",
"trust": 0.8,
"url": "http://docs.info.apple.com/article.html?artnum=305149-ja"
},
{
"title": "\u30a2\u30c3\u30d7\u30eb - QuickTime",
"trust": 0.8,
"url": "http://www.apple.com/jp/quicktime/download/win.html"
},
{
"title": "QuickTime 7.1.5 for Windows",
"trust": 0.8,
"url": "http://www.apple.com/jp/ftp-info/reference/quicktime715forwindows.html"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2007-000191"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-189",
"trust": 1.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-24073"
},
{
"db": "NVD",
"id": "CVE-2007-0711"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 8.9,
"url": "http://www.securityfocus.com/bid/22827"
},
{
"trust": 8.1,
"url": "http://docs.info.apple.com/article.html?artnum=305149"
},
{
"trust": 6.4,
"url": "http://secunia.com/advisories/24359/"
},
{
"trust": 6.4,
"url": "http://www.auscert.org.au/7356"
},
{
"trust": 6.4,
"url": "http://www.ciac.org/ciac/bulletins/r-171.shtml "
},
{
"trust": 5.6,
"url": "http://securitytracker.com/id?1017725 "
},
{
"trust": 2.8,
"url": "http://www.us-cert.gov/cas/techalerts/ta07-065a.html"
},
{
"trust": 2.8,
"url": "http://www.kb.cert.org/vuls/id/568689"
},
{
"trust": 2.7,
"url": "http://www.apple.com/quicktime/download/"
},
{
"trust": 2.5,
"url": "http://www.securitytracker.com/id?1017725"
},
{
"trust": 2.5,
"url": "http://secunia.com/advisories/24359"
},
{
"trust": 2.4,
"url": "http://www.us-cert.gov/cas/tips/st04-010.html"
},
{
"trust": 2.4,
"url": "http://support.microsoft.com/default.aspx?scid=kb;en-us;q294676"
},
{
"trust": 2.4,
"url": "http://www.cert.org/tech_tips/before_you_plug_in.html"
},
{
"trust": 2.4,
"url": "http://www.mozilla.org/support/firefox/faq"
},
{
"trust": 1.7,
"url": "http://lists.apple.com/archives/security-announce/2007/mar/msg00000.html"
},
{
"trust": 1.7,
"url": "http://osvdb.org/33905"
},
{
"trust": 1.6,
"url": "http://www.apple.com/itunes/"
},
{
"trust": 1.4,
"url": "http://www.frsirt.com/english/advisories/2007/0825"
},
{
"trust": 1.4,
"url": "http://xforce.iss.net/xforce/xfdb/32814"
},
{
"trust": 1.1,
"url": "http://www.vupen.com/english/advisories/2007/0825"
},
{
"trust": 1.1,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32814"
},
{
"trust": 0.8,
"url": "http://www.piotrbania.com/all/adv/quicktime-heap-adv-7.1.txt"
},
{
"trust": 0.8,
"url": "http://en.wikipedia.org/wiki/.mov"
},
{
"trust": 0.8,
"url": "http://www.securityfocus.com/bid/22843"
},
{
"trust": 0.8,
"url": "http://en.wikipedia.org/wiki/musical_instrument_digital_interface"
},
{
"trust": 0.8,
"url": "http://developer.apple.com/documentation/quicktime/qtff/index.html"
},
{
"trust": 0.8,
"url": "http://developer.apple.com/documentation/quicktime/qtff/qtffchap2/chapter_3_section_2.html"
},
{
"trust": 0.8,
"url": "http://secway.org/advisory/ad20070306.txt"
},
{
"trust": 0.8,
"url": "http://secway.org/advisory/ad20060512.txt"
},
{
"trust": 0.8,
"url": "http://www.zerodayinitiative.com/advisories/zdi-07-010.html"
},
{
"trust": 0.8,
"url": "http://www.securityfocus.com/bid/22844"
},
{
"trust": 0.8,
"url": "http://en.wikipedia.org/wiki/pict"
},
{
"trust": 0.8,
"url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=486"
},
{
"trust": 0.8,
"url": "http://www.reversemode.com/index.php?option=com_remository\u0026itemid=2\u0026func=fileinfo\u0026id=46"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-0711"
},
{
"trust": 0.8,
"url": "http://jvn.jp/cert/jvnta07-065a/index.html"
},
{
"trust": 0.8,
"url": "http://jvn.jp/tr/trta07-065a/index.html"
},
{
"trust": 0.8,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-0711"
},
{
"trust": 0.8,
"url": "http://www.us-cert.gov/cas/alerts/sa07-065a.html"
},
{
"trust": 0.8,
"url": "http://www.cyberpolice.go.jp/important/2007/20070306_153534.html"
},
{
"trust": 0.3,
"url": "http://www.apple.com/quicktime/"
},
{
"trust": 0.3,
"url": "msg://bugtraq/45ec9719.10206@idefense.com"
},
{
"trust": 0.3,
"url": "http://www.kb.cert.org/vuls/id/313225"
},
{
"trust": 0.3,
"url": "http://www.kb.cert.org/vuls/id/410993"
},
{
"trust": 0.3,
"url": "http://www.kb.cert.org/vuls/id/448745"
},
{
"trust": 0.3,
"url": "http://www.kb.cert.org/vuls/id/642433"
},
{
"trust": 0.3,
"url": "http://www.kb.cert.org/vuls/id/822481"
},
{
"trust": 0.3,
"url": "http://www.kb.cert.org/vuls/id/861817"
},
{
"trust": 0.3,
"url": "http://www.kb.cert.org/vuls/id/880561"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#568689"
},
{
"db": "CERT/CC",
"id": "VU#880561"
},
{
"db": "CERT/CC",
"id": "VU#822481"
},
{
"db": "CERT/CC",
"id": "VU#861817"
},
{
"db": "CERT/CC",
"id": "VU#448745"
},
{
"db": "CERT/CC",
"id": "VU#313225"
},
{
"db": "CERT/CC",
"id": "VU#410993"
},
{
"db": "CERT/CC",
"id": "VU#642433"
},
{
"db": "VULHUB",
"id": "VHN-24073"
},
{
"db": "BID",
"id": "22827"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-000191"
},
{
"db": "CNNVD",
"id": "CNNVD-200703-173"
},
{
"db": "NVD",
"id": "CVE-2007-0711"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CERT/CC",
"id": "VU#568689"
},
{
"db": "CERT/CC",
"id": "VU#880561"
},
{
"db": "CERT/CC",
"id": "VU#822481"
},
{
"db": "CERT/CC",
"id": "VU#861817"
},
{
"db": "CERT/CC",
"id": "VU#448745"
},
{
"db": "CERT/CC",
"id": "VU#313225"
},
{
"db": "CERT/CC",
"id": "VU#410993"
},
{
"db": "CERT/CC",
"id": "VU#642433"
},
{
"db": "VULHUB",
"id": "VHN-24073"
},
{
"db": "BID",
"id": "22827"
},
{
"db": "JVNDB",
"id": "JVNDB-2007-000191"
},
{
"db": "CNNVD",
"id": "CNNVD-200703-173"
},
{
"db": "NVD",
"id": "CVE-2007-0711"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2007-03-06T00:00:00",
"db": "CERT/CC",
"id": "VU#568689"
},
{
"date": "2007-03-06T00:00:00",
"db": "CERT/CC",
"id": "VU#880561"
},
{
"date": "2007-03-06T00:00:00",
"db": "CERT/CC",
"id": "VU#822481"
},
{
"date": "2007-03-06T00:00:00",
"db": "CERT/CC",
"id": "VU#861817"
},
{
"date": "2007-03-06T00:00:00",
"db": "CERT/CC",
"id": "VU#448745"
},
{
"date": "2007-03-06T00:00:00",
"db": "CERT/CC",
"id": "VU#313225"
},
{
"date": "2007-03-06T00:00:00",
"db": "CERT/CC",
"id": "VU#410993"
},
{
"date": "2007-03-06T00:00:00",
"db": "CERT/CC",
"id": "VU#642433"
},
{
"date": "2007-03-05T00:00:00",
"db": "VULHUB",
"id": "VHN-24073"
},
{
"date": "2007-03-05T00:00:00",
"db": "BID",
"id": "22827"
},
{
"date": "2007-04-18T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2007-000191"
},
{
"date": "2007-03-05T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200703-173"
},
{
"date": "2007-03-05T22:19:00",
"db": "NVD",
"id": "CVE-2007-0711"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2007-03-19T00:00:00",
"db": "CERT/CC",
"id": "VU#568689"
},
{
"date": "2007-03-19T00:00:00",
"db": "CERT/CC",
"id": "VU#880561"
},
{
"date": "2007-03-19T00:00:00",
"db": "CERT/CC",
"id": "VU#822481"
},
{
"date": "2007-03-19T00:00:00",
"db": "CERT/CC",
"id": "VU#861817"
},
{
"date": "2007-03-09T00:00:00",
"db": "CERT/CC",
"id": "VU#448745"
},
{
"date": "2007-03-19T00:00:00",
"db": "CERT/CC",
"id": "VU#313225"
},
{
"date": "2007-03-19T00:00:00",
"db": "CERT/CC",
"id": "VU#410993"
},
{
"date": "2007-03-19T00:00:00",
"db": "CERT/CC",
"id": "VU#642433"
},
{
"date": "2018-10-30T00:00:00",
"db": "VULHUB",
"id": "VHN-24073"
},
{
"date": "2007-03-06T21:05:00",
"db": "BID",
"id": "22827"
},
{
"date": "2007-04-18T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2007-000191"
},
{
"date": "2009-03-16T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200703-173"
},
{
"date": "2024-11-21T00:26:33.227000",
"db": "NVD",
"id": "CVE-2007-0711"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200703-173"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Apple QuickTime 3GP integer overflow",
"sources": [
{
"db": "CERT/CC",
"id": "VU#568689"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "digital error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200703-173"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.