Vulnerability CVE-2006-4965


Published: 2006-09-24   Modified: 2012-02-12

Description:
Apple QuickTime 7.1.3 Player and Plug-In allows remote attackers to execute arbitrary JavaScript code and possibly conduct other attacks via a QuickTime Media Link (QTL) file with an embed XML element and a qtnext parameter that identifies resources outside of the original domain. NOTE: as of 20070912, this issue has been demonstrated by using instances of Components.interfaces.nsILocalFile and Components.interfaces.nsIProcess to execute arbitrary local files within Firefox and possibly Internet Explorer.

See advisories in our WLB2 database:
Topic
Author
Date
Low
Backdooring MP3 files (plus QuickTime issues and Cross-context Scripting)
pdp
29.09.2006

Type:

CWE-94

(Improper Control of Generation of Code ('Code Injection'))

CVSS2 => (AV:N/AC:L/Au:N/C:N/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None
Affected software
Apple -> Quicktime 

 References:
http://docs.info.apple.com/article.html?artnum=305149
http://lists.apple.com/archives/Security-announce/2007/Mar/msg00000.html
http://securityreason.com/securityalert/1631
http://www.gnucitizen.org/blog/0day-quicktime-pwns-firefox
http://www.gnucitizen.org/blog/backdooring-mp3-files/
http://www.gnucitizen.org/blog/myspace-quicktime-worm-follow-up
http://www.kb.cert.org/vuls/id/751808
http://www.securityfocus.com/archive/1/446750/100/0/threaded
http://www.securityfocus.com/archive/1/453756/100/0/threaded
http://www.securityfocus.com/archive/1/479179/100/0/threaded
http://www.securityfocus.com/bid/20138
http://www.securitytracker.com/id?1018687
http://www.vupen.com/english/advisories/2007/3155

Copyright 2021, cxsecurity.com

 

Back to Top