CVE-2007-0714
Vulnerability from cvelistv5
Published
2007-03-05 22:00
Modified
2024-08-07 12:26
Severity ?
Summary
Integer overflow in Apple QuickTime before 7.1.5 allows remote user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted QuickTime movie with a User Data Atom (UDTA) with an Atom size field with a large value.
Impacted products
n/an/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T12:26:54.344Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ADV-2007-0825",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/0825"
          },
          {
            "name": "quicktime-udta-atoms-overflow(32819)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32819"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secway.org/advisory/AD20070306.txt"
          },
          {
            "name": "33902",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/33902"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.zerodayinitiative.com/advisories/ZDI-07-010.html"
          },
          {
            "name": "22827",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/22827"
          },
          {
            "name": "20070306 Apple QuickTime udta ATOM Integer Overflow",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/461999/100/0/threaded"
          },
          {
            "name": "24359",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/24359"
          },
          {
            "name": "APPLE-SA-2007-03-05",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/Security-announce/2007/Mar/msg00000.html"
          },
          {
            "name": "1017725",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1017725"
          },
          {
            "name": "20070306 Apple QuickTime udta ATOM Integer Overflow",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/fulldisclosure/2007-03/0003.html"
          },
          {
            "name": "TA07-065A",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT",
              "x_transferred"
            ],
            "url": "http://www.us-cert.gov/cas/techalerts/TA07-065A.html"
          },
          {
            "name": "20070307 ZDI-07-010: Apple Quicktime UDTA Parsing Heap Overflow Vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/462153/100/0/threaded"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://docs.info.apple.com/article.html?artnum=305149"
          },
          {
            "name": "VU#861817",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/861817"
          },
          {
            "name": "22844",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/22844"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-03-05T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Integer overflow in Apple QuickTime before 7.1.5 allows remote user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted QuickTime movie with a User Data Atom (UDTA) with an Atom size field with a large value."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "ADV-2007-0825",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/0825"
        },
        {
          "name": "quicktime-udta-atoms-overflow(32819)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32819"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secway.org/advisory/AD20070306.txt"
        },
        {
          "name": "33902",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/33902"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.zerodayinitiative.com/advisories/ZDI-07-010.html"
        },
        {
          "name": "22827",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/22827"
        },
        {
          "name": "20070306 Apple QuickTime udta ATOM Integer Overflow",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/461999/100/0/threaded"
        },
        {
          "name": "24359",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/24359"
        },
        {
          "name": "APPLE-SA-2007-03-05",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/Security-announce/2007/Mar/msg00000.html"
        },
        {
          "name": "1017725",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1017725"
        },
        {
          "name": "20070306 Apple QuickTime udta ATOM Integer Overflow",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://archives.neohapsis.com/archives/fulldisclosure/2007-03/0003.html"
        },
        {
          "name": "TA07-065A",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT"
          ],
          "url": "http://www.us-cert.gov/cas/techalerts/TA07-065A.html"
        },
        {
          "name": "20070307 ZDI-07-010: Apple Quicktime UDTA Parsing Heap Overflow Vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/462153/100/0/threaded"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://docs.info.apple.com/article.html?artnum=305149"
        },
        {
          "name": "VU#861817",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/861817"
        },
        {
          "name": "22844",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/22844"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-0714",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Integer overflow in Apple QuickTime before 7.1.5 allows remote user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted QuickTime movie with a User Data Atom (UDTA) with an Atom size field with a large value."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ADV-2007-0825",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/0825"
            },
            {
              "name": "quicktime-udta-atoms-overflow(32819)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32819"
            },
            {
              "name": "http://secway.org/advisory/AD20070306.txt",
              "refsource": "MISC",
              "url": "http://secway.org/advisory/AD20070306.txt"
            },
            {
              "name": "33902",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/33902"
            },
            {
              "name": "http://www.zerodayinitiative.com/advisories/ZDI-07-010.html",
              "refsource": "MISC",
              "url": "http://www.zerodayinitiative.com/advisories/ZDI-07-010.html"
            },
            {
              "name": "22827",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/22827"
            },
            {
              "name": "20070306 Apple QuickTime udta ATOM Integer Overflow",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/461999/100/0/threaded"
            },
            {
              "name": "24359",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/24359"
            },
            {
              "name": "APPLE-SA-2007-03-05",
              "refsource": "APPLE",
              "url": "http://lists.apple.com/archives/Security-announce/2007/Mar/msg00000.html"
            },
            {
              "name": "1017725",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1017725"
            },
            {
              "name": "20070306 Apple QuickTime udta ATOM Integer Overflow",
              "refsource": "FULLDISC",
              "url": "http://archives.neohapsis.com/archives/fulldisclosure/2007-03/0003.html"
            },
            {
              "name": "TA07-065A",
              "refsource": "CERT",
              "url": "http://www.us-cert.gov/cas/techalerts/TA07-065A.html"
            },
            {
              "name": "20070307 ZDI-07-010: Apple Quicktime UDTA Parsing Heap Overflow Vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/462153/100/0/threaded"
            },
            {
              "name": "http://docs.info.apple.com/article.html?artnum=305149",
              "refsource": "CONFIRM",
              "url": "http://docs.info.apple.com/article.html?artnum=305149"
            },
            {
              "name": "VU#861817",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/861817"
            },
            {
              "name": "22844",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/22844"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-0714",
    "datePublished": "2007-03-05T22:00:00",
    "dateReserved": "2007-02-05T00:00:00",
    "dateUpdated": "2024-08-07T12:26:54.344Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2007-0714\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2007-03-05T22:19:00.000\",\"lastModified\":\"2018-10-30T16:25:17.370\",\"vulnStatus\":\"Modified\",\"evaluatorSolution\":\"This vulnerability is addressed in latest version of Quicktime 7.1.5\\r\\n\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Integer overflow in Apple QuickTime before 7.1.5 allows remote user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted QuickTime movie with a User Data Atom (UDTA) with an Atom size field with a large value.\"},{\"lang\":\"es\",\"value\":\"Un desbordamiento de enteros en Apple QuickTime anterior a la versi\u00f3n 7.1.5 permite a atacantes remotos asistidos por el usuario causar una denegaci\u00f3n de servicio (bloqueo) y posiblemente ejecutar c\u00f3digo arbitrario por medio de una pel\u00edcula QuickTime creada con un User Data Atom (UDTA) con un campo Atom size con un valor largo.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:C/I:C/A:C\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\",\"baseScore\":9.3},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.6,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-189\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:*:-:windows:*:*:*:*:*\",\"versionEndIncluding\":\"7.1.4\",\"matchCriteriaId\":\"D4848C0C-7CEA-4C7A-956E-0C460A5E3896\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8F310A8-F760-4059-987D-42369F360DE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:4.1.2:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"03C15EB0-1D29-4DBE-B2C0-FE9365E8D624\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:5.0.1:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"EE3EAE38-9DE6-450D-BCD0-70E590C1F76E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:5.0.2:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"63D7214C-FAF6-4DCA-8520-8A539BDCD98A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.0:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"0D02D35D-E957-4949-B5DA-F3654B13A308\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.0.0:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"FC48F2B6-4BC7-4B57-ADE2-4907287A1AA0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.0.1:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"6469AEDC-6F9D-4CAC-84B2-F13107626FB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.0.2:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"CB2DFC1B-6452-4575-A099-2E5FD387A8AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.1.0:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"01A24DD9-5AB8-4091-A293-1A2D7953D455\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.1.1:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"D282FA67-0089-4ED5-8168-E3CE8B510BBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.2.0:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"2B5928A2-C989-4B27-91E1-7019277B2E1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.3.0:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"51292C8C-4905-4C30-B166-ACCE39D9DEE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.4.0:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"3433487A-98ED-4C28-8659-609BF395E23A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.5.0:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"335F4D89-983A-4C05-937A-EEE802A260D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.5.1:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"7F189FAB-3BA1-4C1B-975F-E174D5CB8771\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.5.2:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"F7A30674-38BA-49B8-9DE0-4C9FB5A62DA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.0:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"284BAF97-86BC-4520-BAB6-D75D18FFA1DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.0.0:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"3F4075B0-0F9F-466B-8521-2156849247C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.0.1:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"DF2A6BCB-108E-4226-BC31-6E0057DFB6D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.0.2:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"F8BF6A6A-F734-4395-9305-2E9F52EE888F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.0.3:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"AFCB45F3-397E-42A8-8D08-ECF667939FF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.0.4:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"D5C04F70-E2E6-48F4-948D-9D0C7B2A2F3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.1.0:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"E1DB3FBD-40F4-41FB-A939-3E3A4D0D85B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.1.1:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"F45B47BB-E14F-4437-8828-EF059496BF95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.1.2:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"9B353211-F90E-4F38-9D0B-B8C7EC00E66F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.1.3:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"F6A44CA9-D257-4BB7-B5AB-23193F35FCB5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CF61F35-5905-4BA9-AD7E-7DB261D2F256\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:*:-:mac:*:*:*:*:*\",\"versionEndIncluding\":\"7.1.4\",\"matchCriteriaId\":\"230D8FA7-0AC5-49E5-B886-8ECCD2554700\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8F310A8-F760-4059-987D-42369F360DE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:4.1.2:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"ACE0F153-80B3-4469-AE49-4B7517218574\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:5.0.1:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"53527707-E903-4A12-AB87-6EC5FA9F2EC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:5.0.2:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"A91242F5-485E-4125-A19C-4C20B602DD5D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.0.0:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"8399665C-F8A8-4133-A0CD-E767F8266E94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.0.1:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"F7B48C74-28CC-4348-9CF9-9AF58C7A5E72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.0.2:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"904FA4B7-A6CB-48B4-B887-4B349479D1A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.1.0:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"B2FC05FE-5A85-4D78-BAAF-FFCC2CC4CAFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.1.1:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"BB113931-F886-425C-A0F8-171F6D71A02F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.2.0:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"0A2B95BD-A728-4EE7-A4C9-E1547C34E8E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.3.0:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"05AA3258-E556-4443-AF79-96882A9CF33C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.4.0:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"546B9E74-E86B-462B-A58E-017E3B780B63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.5.0:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"579E49C1-2F66-4CCB-AAE4-6C15089C2D1E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.5.1:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"49477EAA-5AA2-4B55-8BEF-AB3E118DE618\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.5.2:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"19AAC0DE-53D7-42E4-90D2-939C5DF6F651\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.0.0:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"04F44BB3-5221-4D8A-ABC3-C51EC76A5B2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.0.1:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"E1B24679-4C63-4320-A79F-E19CCFA537D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.0.2:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"D0D28529-2A0A-4398-98C2-C35BABB9373A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.0.3:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"402BBD8E-4960-43C0-8D46-6F20BBA6BF2A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.0.4:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"BDBD1E93-C675-4248-ACE6-C49DBE7B3E7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.1.0:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"EA16CB14-D053-4CDB-B80A-8AC9D17FACAC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.1.1:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"60500521-46FC-4734-901C-0A5E5D3DB9EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.1.2:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"682C7A59-6F3C-4E50-A145-D081614CD42F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.1.3:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"D69BB04E-E696-4B34-95DE-B42F46697F9F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC6931D5-DE7E-41F6-ADDC-AB5A8A167F69\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0760FDDB-38D3-4263-9B4D-1AF5E613A4F9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B8B16DB-4D1F-41B7-A7A2-2A443596E1AE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFD4DE58-46C7-4E69-BF36-C5FD768B8248\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF824694-52DE-44E3-ACAD-60B2A84CD3CE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B73A0891-A37A-4E0D-AA73-B18BFD6B1447\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26AC38AB-D689-4B2B-9DAE-F03F4DFD15BE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C580935-0091-4163-B747-750FB7686973\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.4.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB0F2132-8431-4CEF-9A3D-A69425E3834E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.4.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8719F3C4-F1DE-49B5-9301-22414A2B6F9C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09ED46A8-1739-411C-8807-2A416BDB6DFE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.4.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"786BB737-EA99-4EC6-B742-0C35BF2453F9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.4.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D089858-3AF9-4B82-912D-AA33F25E3715\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EE39585-CF3B-4493-96D8-B394544C7643\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2442D35-7484-43D8-9077-3FDF63104816\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC90AA12-DD17-4607-90CB-E342E83F20BB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F3E721C-00CA-4D51-B542-F2BC5C0D65BF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3267A41-1AE0-48B8-BD1F-DEC8A212851A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"855288F1-0242-4951-AB3F-B7AF13E21CF6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10082781-B93E-4B84-94F2-FA9749B4D92B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE1EBF04-C440-4A6B-93F2-DC3A812728C2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFB077A2-927B-43AF-BFD5-0E78648C9394\"}]}]}],\"references\":[{\"url\":\"http://archives.neohapsis.com/archives/fulldisclosure/2007-03/0003.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://docs.info.apple.com/article.html?artnum=305149\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://lists.apple.com/archives/Security-announce/2007/Mar/msg00000.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://osvdb.org/33902\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/24359\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://secway.org/advisory/AD20070306.txt\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.kb.cert.org/vuls/id/861817\",\"source\":\"cve@mitre.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.securityfocus.com/archive/1/461999/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/462153/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/22827\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/22844\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securitytracker.com/id?1017725\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA07-065A.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"US Government Resource\"]},{\"url\":\"http://www.vupen.com/english/advisories/2007/0825\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.zerodayinitiative.com/advisories/ZDI-07-010.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/32819\",\"source\":\"cve@mitre.org\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.