var-200704-0237
Vulnerability from variot
Apple QuickTime Java extensions (QTJava.dll), as used in Safari and other browsers, and when Java is enabled, allows remote attackers to execute arbitrary code via parameters to the toQTPointer method in quicktime.util.QTHandleRef, which can be used to modify arbitrary memory when creating QTPointerRef objects, as demonstrated during the "PWN 2 0WN" contest at CanSecWest 2007. Safari Used in etc. User interaction is required to exploit this vulnerability in that the target must visit a malicious page.The flaw exists within the QuickTime Java extensions (QTJava.dll), specifically the routine toQTPointer() exposed through quicktime.util.QTHandleRef. A lack of sanity checking on the parameters passed to this routine, through the Java Virtual Machine (JVM), allows an attacker to write arbitrary values to memory. This can be leveraged to execute arbitrary code under the context of the current user. Example code execution vectors include Microsoft Internet Explorer, Mozilla Firefox and Apple Safari. This vulnerability affects the latest versions of both the MacOS and Windows operating systems, including MacOS 10.4.9 and Windows Vista. QuickTime is prone to a vulnerability that may aid in the remote compromise of a vulnerable computer. The issue occurs when a Java-enabled browser is used to view a malicious website. QuickTime must also be installed. Failed exploit attempts will likely result in denial-of-service conditions. This issue is exploitable through both Safari and Mozilla Firefox running on Mac OS X. Reports indicate that Firefox on Windows platforms may also be an exploit vector. Reports also indicate that Internet Explorer 6 and 7 running on Windows XP may be an exploit vector, but that a sandboxing feature may interfere with successful exploits. Neither of these points has been confirmed. Apple QuickTime is a popular multimedia player that supports a wide variety of media formats. ZDI-07-023: Apple QTJava toQTPointer() Pointer Arithmetic Memory Overwrite Vulnerability http://www.zerodayinitiative.com/advisories/ZDI-07-023.html May 1, 2007
-- CVE ID: CVE-2007-2175
-- Affected Vendor: Apple
-- Affected Products: Quicktime
-- TippingPoint(TM) IPS Customer Protection: TippingPoint IPS customers have been protected against this vulnerability since April 23, 2007 by Digital Vaccine protection filter ID 5310, 5311.
-- Vendor Response: Apple has issued an update to correct this vulnerability. More details can be found at:
http://docs.info.apple.com/article.html?artnum=305446
-- Disclosure Timeline: 2007.04.23 - Vulnerability reported to vendor 2007.04.23 - Digital Vaccine released to TippingPoint customers 2007.05.01 - Coordinated public release of advisory
-- Credit: This vulnerability was discovered by Dino A. Dai Zovi.
-- About the Zero Day Initiative (ZDI): Established by TippingPoint, a division of 3Com, The Zero Day Initiative (ZDI) represents a best-of-breed model for rewarding security researchers for responsibly disclosing discovered vulnerabilities.
Researchers interested in getting paid for their security research through the ZDI can find more information and sign-up at:
http://www.zerodayinitiative.com
The ZDI is unique in how the acquired vulnerability information is used. 3Com does not re-sell the vulnerability details or any exploit code. Instead, upon notifying the affected product vendor, 3Com provides its customers with zero day protection through its intrusion prevention technology. Explicit details regarding the specifics of the vulnerability are not exposed to any parties until an official vendor patch is publicly available. Furthermore, with the altruistic aim of helping to secure a broader user base, 3Com provides this vulnerability information confidentially to security vendors (including competitors) who have a vulnerability protection or mitigation product.
Secunia customers receive relevant and filtered advisories. Delivery is done via different channels including SMS, Email, Web, and https based XML feed. http://corporate.secunia.com/trial/38/request/
TITLE: Apple QuickTime Java Handling Unspecified Code Execution
SECUNIA ADVISORY ID: SA25011
VERIFY ADVISORY: http://secunia.com/advisories/25011/
CRITICAL: Highly critical
IMPACT: System access
WHERE:
From remote
SOFTWARE: Apple QuickTime 7.x http://secunia.com/product/5090/ Apple Quicktime 6.x http://secunia.com/product/810/ Apple Quicktime 5.x http://secunia.com/product/215/ Apple Quicktime 4.x http://secunia.com/product/7923/ Apple Quicktime 3.x http://secunia.com/product/10883/
DESCRIPTION: A vulnerability has been reported in Apple QuickTime, which can be exploited by malicious people to compromise a user's system. Other browsers and platforms may also be affected.
SOLUTION: Disable Java support.
Do not browse untrusted websites.
PROVIDED AND/OR DISCOVERED BY: Dino Dai Zovi
ORIGINAL ADVISORY: Matasano: http://www.matasano.com/log/812/breaking-macbook-vuln-in-quicktime-affects-win32-apple-code/
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200704-0237", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "safari", "scope": null, "trust": 1.4, "vendor": "apple", "version": null }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "*" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "apple computer", "version": null }, { "model": "quicktime", "scope": null, "trust": 0.7, "vendor": "apple", "version": null }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.1.5" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.1.4" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.1.3" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.1.2" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.1.1" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.0.4" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.0.3" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.0.2" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.0.1" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.0" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "6.5.2" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "6.5.1" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "6.5" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "6.1" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.0.2" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "7.1" }, { "model": "quicktime player", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "6" }, { "model": "quicktime player", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "7.1.6" } ], "sources": [ { "db": "CERT/CC", "id": "VU#420668" }, { "db": "ZDI", "id": "ZDI-07-023" }, { "db": "BID", "id": "23608" }, { "db": "JVNDB", "id": "JVNDB-2007-001862" }, { "db": "CNNVD", "id": "CNNVD-200704-414" }, { "db": "NVD", "id": "CVE-2007-2175" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:apple:safari", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2007-001862" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Dino A. Dai Zovi", "sources": [ { "db": "ZDI", "id": "ZDI-07-023" } ], "trust": 0.7 }, "cve": "CVE-2007-2175", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.6, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 4.9, "id": "CVE-2007-2175", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.6, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 4.9, "id": "VHN-25537", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:H/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2007-2175", "trust": 1.0, "value": "HIGH" }, { "author": "CARNEGIE MELLON", "id": "VU#420668", "trust": 0.8, "value": "10.01" }, { "author": "NVD", "id": "CVE-2007-2175", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-200704-414", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-25537", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#420668" }, { "db": "VULHUB", "id": "VHN-25537" }, { "db": "JVNDB", "id": "JVNDB-2007-001862" }, { "db": "CNNVD", "id": "CNNVD-200704-414" }, { "db": "NVD", "id": "CVE-2007-2175" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Apple QuickTime Java extensions (QTJava.dll), as used in Safari and other browsers, and when Java is enabled, allows remote attackers to execute arbitrary code via parameters to the toQTPointer method in quicktime.util.QTHandleRef, which can be used to modify arbitrary memory when creating QTPointerRef objects, as demonstrated during the \"PWN 2 0WN\" contest at CanSecWest 2007. Safari Used in etc. User interaction is required to exploit this vulnerability in that the target must visit a malicious page.The flaw exists within the QuickTime Java extensions (QTJava.dll), specifically the routine toQTPointer() exposed through quicktime.util.QTHandleRef. A lack of sanity checking on the parameters passed to this routine, through the Java Virtual Machine (JVM), allows an attacker to write arbitrary values to memory. This can be leveraged to execute arbitrary code under the context of the current user. Example code execution vectors include Microsoft Internet Explorer, Mozilla Firefox and Apple Safari. This vulnerability affects the latest versions of both the MacOS and Windows operating systems, including MacOS 10.4.9 and Windows Vista. QuickTime is prone to a vulnerability that may aid in the remote compromise of a vulnerable computer. \nThe issue occurs when a Java-enabled browser is used to view a malicious website. QuickTime must also be installed. Failed exploit attempts will likely result in denial-of-service conditions. \nThis issue is exploitable through both Safari and Mozilla Firefox running on Mac OS X. Reports indicate that Firefox on Windows platforms may also be an exploit vector. \nReports also indicate that Internet Explorer 6 and 7 running on Windows XP may be an exploit vector, but that a sandboxing feature may interfere with successful exploits. Neither of these points has been confirmed. Apple QuickTime is a popular multimedia player that supports a wide variety of media formats. ZDI-07-023: Apple QTJava toQTPointer() Pointer Arithmetic Memory\n Overwrite Vulnerability\nhttp://www.zerodayinitiative.com/advisories/ZDI-07-023.html\nMay 1, 2007\n\n-- CVE ID:\nCVE-2007-2175\n\n-- Affected Vendor:\nApple\n\n-- Affected Products:\nQuicktime\n\n-- TippingPoint(TM) IPS Customer Protection:\nTippingPoint IPS customers have been protected against this\nvulnerability since April 23, 2007 by Digital Vaccine protection\nfilter ID 5310, 5311. \n\n-- Vendor Response:\nApple has issued an update to correct this vulnerability. More details\ncan be found at:\n\n http://docs.info.apple.com/article.html?artnum=305446\n\n-- Disclosure Timeline:\n2007.04.23 - Vulnerability reported to vendor\n2007.04.23 - Digital Vaccine released to TippingPoint customers\n2007.05.01 - Coordinated public release of advisory\n\n-- Credit:\nThis vulnerability was discovered by Dino A. Dai Zovi. \n\n-- About the Zero Day Initiative (ZDI):\nEstablished by TippingPoint, a division of 3Com, The Zero Day Initiative\n(ZDI) represents a best-of-breed model for rewarding security\nresearchers for responsibly disclosing discovered vulnerabilities. \n\nResearchers interested in getting paid for their security research\nthrough the ZDI can find more information and sign-up at:\n\n http://www.zerodayinitiative.com\n\nThe ZDI is unique in how the acquired vulnerability information is used. \n3Com does not re-sell the vulnerability details or any exploit code. \nInstead, upon notifying the affected product vendor, 3Com provides its\ncustomers with zero day protection through its intrusion prevention\ntechnology. Explicit details regarding the specifics of the\nvulnerability are not exposed to any parties until an official vendor\npatch is publicly available. Furthermore, with the altruistic aim of\nhelping to secure a broader user base, 3Com provides this vulnerability\ninformation confidentially to security vendors (including competitors)\nwho have a vulnerability protection or mitigation product. \n\n----------------------------------------------------------------------\n\nSecunia customers receive relevant and filtered advisories. \nDelivery is done via different channels including SMS, Email, Web,\nand https based XML feed. \nhttp://corporate.secunia.com/trial/38/request/\n\n----------------------------------------------------------------------\n\nTITLE:\nApple QuickTime Java Handling Unspecified Code Execution\n\nSECUNIA ADVISORY ID:\nSA25011\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/25011/\n\nCRITICAL:\nHighly critical\n\nIMPACT:\nSystem access\n\nWHERE:\n\u003eFrom remote\n\nSOFTWARE:\nApple QuickTime 7.x\nhttp://secunia.com/product/5090/\nApple Quicktime 6.x\nhttp://secunia.com/product/810/\nApple Quicktime 5.x\nhttp://secunia.com/product/215/\nApple Quicktime 4.x\nhttp://secunia.com/product/7923/\nApple Quicktime 3.x\nhttp://secunia.com/product/10883/\n\nDESCRIPTION:\nA vulnerability has been reported in Apple QuickTime, which can be\nexploited by malicious people to compromise a user\u0027s system. Other browsers and platforms may also be affected. \n\nSOLUTION:\nDisable Java support. \n\nDo not browse untrusted websites. \n\nPROVIDED AND/OR DISCOVERED BY:\nDino Dai Zovi\n\nORIGINAL ADVISORY:\nMatasano:\nhttp://www.matasano.com/log/812/breaking-macbook-vuln-in-quicktime-affects-win32-apple-code/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2007-2175" }, { "db": "CERT/CC", "id": "VU#420668" }, { "db": "JVNDB", "id": "JVNDB-2007-001862" }, { "db": "ZDI", "id": "ZDI-07-023" }, { "db": "BID", "id": "23608" }, { "db": "VULHUB", "id": "VHN-25537" }, { "db": "PACKETSTORM", "id": "56412" }, { "db": "PACKETSTORM", "id": "56195" } ], "trust": 3.51 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-25537", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-25537" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "ZDI", "id": "ZDI-07-023", "trust": 3.6 }, { "db": "CERT/CC", "id": "VU#420668", "trust": 3.6 }, { "db": "NVD", "id": "CVE-2007-2175", "trust": 3.6 }, { "db": "SECTRACK", "id": "1017950", "trust": 2.5 }, { "db": "OSVDB", "id": "34178", "trust": 1.7 }, { "db": "SECUNIA", "id": "25011", "trust": 0.9 }, { "db": "JVNDB", "id": "JVNDB-2007-001862", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-190", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-200704-414", "trust": 0.7 }, { "db": "XF", "id": "33827", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "20070501 ZDI-07-023: APPLE QTJAVA TOQTPOINTER() POINTER ARITHMETIC MEMORY OVERWRITE VULNERABILITY", "trust": 0.6 }, { "db": "APPLE", "id": "APPLE-SA-2007-05-01", "trust": 0.6 }, { "db": "BID", "id": "23608", "trust": 0.4 }, { "db": "PACKETSTORM", "id": "56412", "trust": 0.2 }, { "db": "SEEBUG", "id": "SSVID-66993", "trust": 0.1 }, { "db": "SEEBUG", "id": "SSVID-70813", "trust": 0.1 }, { "db": "SEEBUG", "id": "SSVID-83359", "trust": 0.1 }, { "db": "EXPLOIT-DB", "id": "9943", "trust": 0.1 }, { "db": "EXPLOIT-DB", "id": "29884", "trust": 0.1 }, { "db": "EXPLOIT-DB", "id": "16295", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "82265", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-25537", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "56195", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#420668" }, { "db": "ZDI", "id": "ZDI-07-023" }, { "db": "VULHUB", "id": "VHN-25537" }, { "db": "BID", "id": "23608" }, { "db": "JVNDB", "id": "JVNDB-2007-001862" }, { "db": "PACKETSTORM", "id": "56412" }, { "db": "PACKETSTORM", "id": "56195" }, { "db": "CNNVD", "id": "CNNVD-200704-414" }, { "db": "NVD", "id": "CVE-2007-2175" } ] }, "id": "VAR-200704-0237", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-25537" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T22:03:54.433000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "APPLE-SA-2007-05-01", "trust": 0.8, "url": "http://lists.apple.com/archives/security-announce/2007/May/msg00001.html" }, { "title": "Apple has issued an update to correct this vulnerability.", "trust": 0.7, "url": "http://docs.info.apple.com/article.html?artnum=305446" } ], "sources": [ { "db": "ZDI", "id": "ZDI-07-023" }, { "db": "JVNDB", "id": "JVNDB-2007-001862" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2007-2175" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.3, "url": "http://docs.info.apple.com/article.html?artnum=305446" }, { "trust": 2.9, "url": "http://www.zerodayinitiative.com/advisories/zdi-07-023.html" }, { "trust": 2.9, "url": "http://www.matasano.com/log/812/breaking-macbook-vuln-in-quicktime-affects-win32-apple-code/" }, { "trust": 2.8, "url": "http://www.kb.cert.org/vuls/id/420668" }, { "trust": 2.0, "url": "http://www.matasano.com/log/806/hot-off-the-matasano-sms-queue-cansec-macbook-challenge-won/" }, { "trust": 1.7, "url": "http://lists.apple.com/archives/security-announce/2007/may/msg00001.html" }, { "trust": 1.7, "url": "http://cansecwest.com/post/2007-04-20-14:54:00.first_mac_hacked_cancel_or_allow" }, { "trust": 1.7, "url": "http://www.theregister.co.uk/2007/04/20/pwn-2-own_winner/" }, { "trust": 1.7, "url": "http://www.osvdb.org/34178" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id?1017950" }, { "trust": 1.1, "url": "http://www.securityfocus.com/archive/1/467319/100/0/threaded" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33827" }, { "trust": 0.9, "url": "http://secunia.com/advisories/25011/" }, { "trust": 0.8, "url": "http://developer.apple.com/quicktime/qtjava/" }, { "trust": 0.8, "url": "http://developer.apple.com/documentation/java/reference/1.3.1/java131api_qtj/quicktime/util/qtpointerref.html" }, { "trust": 0.8, "url": "http://www.cansecwest.com/post/2007-04-20-14:54:00.first_mac_hacked_cancel_or_allow" }, { "trust": 0.8, "url": "http://www.securityfocus.com/brief/488" }, { "trust": 0.8, "url": "http://www.securitytracker.com/id?1017950 " }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-2175" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-2175" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/33827" }, { "trust": 0.6, "url": "http://www.securityfocus.com/archive/1/archive/1/467319/100/0/threaded" }, { "trust": 0.3, "url": "http://www.matasano.com/log/839/the-bug-report-that-would-not-die-dinos-finding-works-in-ie7/" }, { "trust": 0.3, "url": "http://software.cisco.com/download/navigator.html?mdfid=283613663" }, { "trust": 0.3, "url": "http://www.matasano.com/log/849/details-on-dinos-quicktime-advisory-with-code-snippet/" }, { "trust": 0.3, "url": "http://securitywatch.eweek.com/mac_hacked_by_quicktime_bug_as_serious_as_ani.html" }, { "trust": 0.3, "url": "http://www.apple.com/macosx/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2007-2175" }, { "trust": 0.1, "url": "http://www.tippingpoint.com" }, { "trust": 0.1, "url": "http://www.zerodayinitiative.com" }, { "trust": 0.1, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/product/5090/" }, { "trust": 0.1, "url": "http://secunia.com/product/10883/" }, { "trust": 0.1, "url": "http://corporate.secunia.com/trial/38/request/" }, { "trust": 0.1, "url": "http://secunia.com/product/810/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/product/7923/" }, { "trust": 0.1, "url": "http://secunia.com/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/product/215/" } ], "sources": [ { "db": "CERT/CC", "id": "VU#420668" }, { "db": "ZDI", "id": "ZDI-07-023" }, { "db": "VULHUB", "id": "VHN-25537" }, { "db": "BID", "id": "23608" }, { "db": "JVNDB", "id": "JVNDB-2007-001862" }, { "db": "PACKETSTORM", "id": "56412" }, { "db": "PACKETSTORM", "id": "56195" }, { "db": "CNNVD", "id": "CNNVD-200704-414" }, { "db": "NVD", "id": "CVE-2007-2175" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#420668" }, { "db": "ZDI", "id": "ZDI-07-023" }, { "db": "VULHUB", "id": "VHN-25537" }, { "db": "BID", "id": "23608" }, { "db": "JVNDB", "id": "JVNDB-2007-001862" }, { "db": "PACKETSTORM", "id": "56412" }, { "db": "PACKETSTORM", "id": "56195" }, { "db": "CNNVD", "id": "CNNVD-200704-414" }, { "db": "NVD", "id": "CVE-2007-2175" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2007-05-02T00:00:00", "db": "CERT/CC", "id": "VU#420668" }, { "date": "2007-05-01T00:00:00", "db": "ZDI", "id": "ZDI-07-023" }, { "date": "2007-04-24T00:00:00", "db": "VULHUB", "id": "VHN-25537" }, { "date": "2007-04-23T00:00:00", "db": "BID", "id": "23608" }, { "date": "2012-06-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2007-001862" }, { "date": "2007-05-03T07:03:57", "db": "PACKETSTORM", "id": "56412" }, { "date": "2007-04-25T03:31:31", "db": "PACKETSTORM", "id": "56195" }, { "date": "2007-04-24T00:00:00", "db": "CNNVD", "id": "CNNVD-200704-414" }, { "date": "2007-04-24T16:19:00", "db": "NVD", "id": "CVE-2007-2175" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2007-05-02T00:00:00", "db": "CERT/CC", "id": "VU#420668" }, { "date": "2007-05-01T00:00:00", "db": "ZDI", "id": "ZDI-07-023" }, { "date": "2018-10-16T00:00:00", "db": "VULHUB", "id": "VHN-25537" }, { "date": "2007-10-24T16:36:00", "db": "BID", "id": "23608" }, { "date": "2012-06-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2007-001862" }, { "date": "2007-05-10T00:00:00", "db": "CNNVD", "id": "CNNVD-200704-414" }, { "date": "2024-11-21T00:30:06.110000", "db": "NVD", "id": "CVE-2007-2175" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200704-414" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Apple QuickTime for Java QTPointerRef heap memory corruption vulnerability", "sources": [ { "db": "CERT/CC", "id": "VU#420668" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation", "sources": [ { "db": "CNNVD", "id": "CNNVD-200704-414" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.