CVE-2007-0714
Vulnerability from cvelistv5
Published
2007-03-05 22:00
Modified
2024-08-07 12:26
Severity ?
EPSS score ?
Summary
Integer overflow in Apple QuickTime before 7.1.5 allows remote user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted QuickTime movie with a User Data Atom (UDTA) with an Atom size field with a large value.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T12:26:54.344Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2007-0825", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/0825" }, { "name": "quicktime-udta-atoms-overflow(32819)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32819" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secway.org/advisory/AD20070306.txt" }, { "name": "33902", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/33902" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-07-010.html" }, { "name": "22827", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/22827" }, { "name": "20070306 Apple QuickTime udta ATOM Integer Overflow", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/461999/100/0/threaded" }, { "name": "24359", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24359" }, { "name": "APPLE-SA-2007-03-05", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/Security-announce/2007/Mar/msg00000.html" }, { "name": "1017725", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1017725" }, { "name": "20070306 Apple QuickTime udta ATOM Integer Overflow", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2007-03/0003.html" }, { "name": "TA07-065A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-065A.html" }, { "name": "20070307 ZDI-07-010: Apple Quicktime UDTA Parsing Heap Overflow Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/462153/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://docs.info.apple.com/article.html?artnum=305149" }, { "name": "VU#861817", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/861817" }, { "name": "22844", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/22844" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-03-05T00:00:00", "descriptions": [ { "lang": "en", "value": "Integer overflow in Apple QuickTime before 7.1.5 allows remote user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted QuickTime movie with a User Data Atom (UDTA) with an Atom size field with a large value." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ADV-2007-0825", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/0825" }, { "name": "quicktime-udta-atoms-overflow(32819)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32819" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secway.org/advisory/AD20070306.txt" }, { "name": "33902", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/33902" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-07-010.html" }, { "name": "22827", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/22827" }, { "name": "20070306 Apple QuickTime udta ATOM Integer Overflow", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/461999/100/0/threaded" }, { "name": "24359", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24359" }, { "name": "APPLE-SA-2007-03-05", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/Security-announce/2007/Mar/msg00000.html" }, { "name": "1017725", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1017725" }, { "name": "20070306 Apple QuickTime udta ATOM Integer Overflow", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2007-03/0003.html" }, { "name": "TA07-065A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-065A.html" }, { "name": "20070307 ZDI-07-010: Apple Quicktime UDTA Parsing Heap Overflow Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/462153/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://docs.info.apple.com/article.html?artnum=305149" }, { "name": "VU#861817", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/861817" }, { "name": "22844", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/22844" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-0714", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Integer overflow in Apple QuickTime before 7.1.5 allows remote user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted QuickTime movie with a User Data Atom (UDTA) with an Atom size field with a large value." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2007-0825", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/0825" }, { "name": "quicktime-udta-atoms-overflow(32819)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32819" }, { "name": "http://secway.org/advisory/AD20070306.txt", "refsource": "MISC", "url": "http://secway.org/advisory/AD20070306.txt" }, { "name": "33902", "refsource": "OSVDB", "url": "http://osvdb.org/33902" }, { "name": "http://www.zerodayinitiative.com/advisories/ZDI-07-010.html", "refsource": "MISC", "url": "http://www.zerodayinitiative.com/advisories/ZDI-07-010.html" }, { "name": "22827", "refsource": "BID", "url": "http://www.securityfocus.com/bid/22827" }, { "name": "20070306 Apple QuickTime udta ATOM Integer Overflow", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/461999/100/0/threaded" }, { "name": "24359", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24359" }, { "name": "APPLE-SA-2007-03-05", "refsource": "APPLE", "url": "http://lists.apple.com/archives/Security-announce/2007/Mar/msg00000.html" }, { "name": "1017725", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1017725" }, { "name": "20070306 Apple QuickTime udta ATOM Integer Overflow", "refsource": "FULLDISC", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2007-03/0003.html" }, { "name": "TA07-065A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA07-065A.html" }, { "name": "20070307 ZDI-07-010: Apple Quicktime UDTA Parsing Heap Overflow Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/462153/100/0/threaded" }, { "name": "http://docs.info.apple.com/article.html?artnum=305149", "refsource": "CONFIRM", "url": "http://docs.info.apple.com/article.html?artnum=305149" }, { "name": "VU#861817", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/861817" }, { "name": "22844", "refsource": "BID", "url": "http://www.securityfocus.com/bid/22844" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-0714", "datePublished": "2007-03-05T22:00:00", "dateReserved": "2007-02-05T00:00:00", "dateUpdated": "2024-08-07T12:26:54.344Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2007-0714\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2007-03-05T22:19:00.000\",\"lastModified\":\"2018-10-30T16:25:17.370\",\"vulnStatus\":\"Modified\",\"evaluatorSolution\":\"This vulnerability is addressed in latest version of Quicktime 7.1.5\\r\\n\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Integer overflow in Apple QuickTime before 7.1.5 allows remote user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted QuickTime movie with a User Data Atom (UDTA) with an Atom size field with a large value.\"},{\"lang\":\"es\",\"value\":\"Un desbordamiento de enteros en Apple QuickTime anterior a la versi\u00f3n 7.1.5 permite a atacantes remotos asistidos por el usuario causar una denegaci\u00f3n de servicio (bloqueo) y posiblemente ejecutar c\u00f3digo arbitrario por medio de una pel\u00edcula QuickTime creada con un User Data Atom (UDTA) con un campo Atom size con un valor largo.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:C/I:C/A:C\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\",\"baseScore\":9.3},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.6,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-189\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:*:-:windows:*:*:*:*:*\",\"versionEndIncluding\":\"7.1.4\",\"matchCriteriaId\":\"D4848C0C-7CEA-4C7A-956E-0C460A5E3896\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8F310A8-F760-4059-987D-42369F360DE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:4.1.2:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"03C15EB0-1D29-4DBE-B2C0-FE9365E8D624\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:5.0.1:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"EE3EAE38-9DE6-450D-BCD0-70E590C1F76E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:5.0.2:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"63D7214C-FAF6-4DCA-8520-8A539BDCD98A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.0:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"0D02D35D-E957-4949-B5DA-F3654B13A308\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.0.0:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"FC48F2B6-4BC7-4B57-ADE2-4907287A1AA0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.0.1:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"6469AEDC-6F9D-4CAC-84B2-F13107626FB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.0.2:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"CB2DFC1B-6452-4575-A099-2E5FD387A8AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.1.0:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"01A24DD9-5AB8-4091-A293-1A2D7953D455\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.1.1:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"D282FA67-0089-4ED5-8168-E3CE8B510BBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.2.0:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"2B5928A2-C989-4B27-91E1-7019277B2E1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.3.0:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"51292C8C-4905-4C30-B166-ACCE39D9DEE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.4.0:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"3433487A-98ED-4C28-8659-609BF395E23A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.5.0:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"335F4D89-983A-4C05-937A-EEE802A260D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.5.1:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"7F189FAB-3BA1-4C1B-975F-E174D5CB8771\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.5.2:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"F7A30674-38BA-49B8-9DE0-4C9FB5A62DA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.0:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"284BAF97-86BC-4520-BAB6-D75D18FFA1DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.0.0:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"3F4075B0-0F9F-466B-8521-2156849247C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.0.1:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"DF2A6BCB-108E-4226-BC31-6E0057DFB6D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.0.2:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"F8BF6A6A-F734-4395-9305-2E9F52EE888F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.0.3:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"AFCB45F3-397E-42A8-8D08-ECF667939FF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.0.4:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"D5C04F70-E2E6-48F4-948D-9D0C7B2A2F3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.1.0:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"E1DB3FBD-40F4-41FB-A939-3E3A4D0D85B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.1.1:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"F45B47BB-E14F-4437-8828-EF059496BF95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.1.2:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"9B353211-F90E-4F38-9D0B-B8C7EC00E66F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.1.3:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"F6A44CA9-D257-4BB7-B5AB-23193F35FCB5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CF61F35-5905-4BA9-AD7E-7DB261D2F256\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:*:-:mac:*:*:*:*:*\",\"versionEndIncluding\":\"7.1.4\",\"matchCriteriaId\":\"230D8FA7-0AC5-49E5-B886-8ECCD2554700\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8F310A8-F760-4059-987D-42369F360DE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:4.1.2:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"ACE0F153-80B3-4469-AE49-4B7517218574\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:5.0.1:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"53527707-E903-4A12-AB87-6EC5FA9F2EC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:5.0.2:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"A91242F5-485E-4125-A19C-4C20B602DD5D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.0.0:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"8399665C-F8A8-4133-A0CD-E767F8266E94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.0.1:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"F7B48C74-28CC-4348-9CF9-9AF58C7A5E72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.0.2:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"904FA4B7-A6CB-48B4-B887-4B349479D1A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.1.0:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"B2FC05FE-5A85-4D78-BAAF-FFCC2CC4CAFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.1.1:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"BB113931-F886-425C-A0F8-171F6D71A02F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.2.0:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"0A2B95BD-A728-4EE7-A4C9-E1547C34E8E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.3.0:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"05AA3258-E556-4443-AF79-96882A9CF33C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.4.0:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"546B9E74-E86B-462B-A58E-017E3B780B63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.5.0:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"579E49C1-2F66-4CCB-AAE4-6C15089C2D1E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.5.1:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"49477EAA-5AA2-4B55-8BEF-AB3E118DE618\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.5.2:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"19AAC0DE-53D7-42E4-90D2-939C5DF6F651\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.0.0:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"04F44BB3-5221-4D8A-ABC3-C51EC76A5B2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.0.1:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"E1B24679-4C63-4320-A79F-E19CCFA537D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.0.2:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"D0D28529-2A0A-4398-98C2-C35BABB9373A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.0.3:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"402BBD8E-4960-43C0-8D46-6F20BBA6BF2A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.0.4:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"BDBD1E93-C675-4248-ACE6-C49DBE7B3E7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.1.0:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"EA16CB14-D053-4CDB-B80A-8AC9D17FACAC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.1.1:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"60500521-46FC-4734-901C-0A5E5D3DB9EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.1.2:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"682C7A59-6F3C-4E50-A145-D081614CD42F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.1.3:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"D69BB04E-E696-4B34-95DE-B42F46697F9F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC6931D5-DE7E-41F6-ADDC-AB5A8A167F69\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0760FDDB-38D3-4263-9B4D-1AF5E613A4F9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B8B16DB-4D1F-41B7-A7A2-2A443596E1AE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFD4DE58-46C7-4E69-BF36-C5FD768B8248\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF824694-52DE-44E3-ACAD-60B2A84CD3CE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B73A0891-A37A-4E0D-AA73-B18BFD6B1447\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26AC38AB-D689-4B2B-9DAE-F03F4DFD15BE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C580935-0091-4163-B747-750FB7686973\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.4.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB0F2132-8431-4CEF-9A3D-A69425E3834E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.4.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8719F3C4-F1DE-49B5-9301-22414A2B6F9C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09ED46A8-1739-411C-8807-2A416BDB6DFE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.4.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"786BB737-EA99-4EC6-B742-0C35BF2453F9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.4.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D089858-3AF9-4B82-912D-AA33F25E3715\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EE39585-CF3B-4493-96D8-B394544C7643\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2442D35-7484-43D8-9077-3FDF63104816\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC90AA12-DD17-4607-90CB-E342E83F20BB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F3E721C-00CA-4D51-B542-F2BC5C0D65BF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3267A41-1AE0-48B8-BD1F-DEC8A212851A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"855288F1-0242-4951-AB3F-B7AF13E21CF6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10082781-B93E-4B84-94F2-FA9749B4D92B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE1EBF04-C440-4A6B-93F2-DC3A812728C2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFB077A2-927B-43AF-BFD5-0E78648C9394\"}]}]}],\"references\":[{\"url\":\"http://archives.neohapsis.com/archives/fulldisclosure/2007-03/0003.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://docs.info.apple.com/article.html?artnum=305149\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://lists.apple.com/archives/Security-announce/2007/Mar/msg00000.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://osvdb.org/33902\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/24359\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://secway.org/advisory/AD20070306.txt\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.kb.cert.org/vuls/id/861817\",\"source\":\"cve@mitre.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.securityfocus.com/archive/1/461999/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/462153/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/22827\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/22844\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securitytracker.com/id?1017725\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA07-065A.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"US Government Resource\"]},{\"url\":\"http://www.vupen.com/english/advisories/2007/0825\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.zerodayinitiative.com/advisories/ZDI-07-010.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/32819\",\"source\":\"cve@mitre.org\"}]}}" } }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.