CVE-2007-0712 (GCVE-0-2007-0712)
Vulnerability from cvelistv5 – Published: 2007-03-05 22:00 – Updated: 2024-08-07 12:26
VLAI?
Summary
Heap-based buffer overflow in Apple QuickTime before 7.1.5 allows remote user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted MIDI file.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T12:26:54.389Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "33904",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/33904"
},
{
"name": "ADV-2007-0825",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/0825"
},
{
"name": "22827",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/22827"
},
{
"name": "24359",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/24359"
},
{
"name": "APPLE-SA-2007-03-05",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/archives/Security-announce/2007/Mar/msg00000.html"
},
{
"name": "1017725",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1017725"
},
{
"name": "TA07-065A",
"tags": [
"third-party-advisory",
"x_refsource_CERT",
"x_transferred"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA07-065A.html"
},
{
"name": "quicktime-midi-files-bo(32816)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32816"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://docs.info.apple.com/article.html?artnum=305149"
},
{
"name": "VU#822481",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/822481"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-03-05T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Heap-based buffer overflow in Apple QuickTime before 7.1.5 allows remote user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted MIDI file."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-28T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "33904",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/33904"
},
{
"name": "ADV-2007-0825",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/0825"
},
{
"name": "22827",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/22827"
},
{
"name": "24359",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/24359"
},
{
"name": "APPLE-SA-2007-03-05",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/archives/Security-announce/2007/Mar/msg00000.html"
},
{
"name": "1017725",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1017725"
},
{
"name": "TA07-065A",
"tags": [
"third-party-advisory",
"x_refsource_CERT"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA07-065A.html"
},
{
"name": "quicktime-midi-files-bo(32816)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32816"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://docs.info.apple.com/article.html?artnum=305149"
},
{
"name": "VU#822481",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "http://www.kb.cert.org/vuls/id/822481"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-0712",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Heap-based buffer overflow in Apple QuickTime before 7.1.5 allows remote user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted MIDI file."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "33904",
"refsource": "OSVDB",
"url": "http://osvdb.org/33904"
},
{
"name": "ADV-2007-0825",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0825"
},
{
"name": "22827",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22827"
},
{
"name": "24359",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24359"
},
{
"name": "APPLE-SA-2007-03-05",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/Security-announce/2007/Mar/msg00000.html"
},
{
"name": "1017725",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1017725"
},
{
"name": "TA07-065A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA07-065A.html"
},
{
"name": "quicktime-midi-files-bo(32816)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32816"
},
{
"name": "http://docs.info.apple.com/article.html?artnum=305149",
"refsource": "CONFIRM",
"url": "http://docs.info.apple.com/article.html?artnum=305149"
},
{
"name": "VU#822481",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/822481"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-0712",
"datePublished": "2007-03-05T22:00:00",
"dateReserved": "2007-02-05T00:00:00",
"dateUpdated": "2024-08-07T12:26:54.389Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:quicktime:*:-:windows:*:*:*:*:*\", \"versionEndIncluding\": \"7.1.4\", \"matchCriteriaId\": \"D4848C0C-7CEA-4C7A-956E-0C460A5E3896\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:quicktime:3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D8F310A8-F760-4059-987D-42369F360DE4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:quicktime:4.1.2:-:windows:*:*:*:*:*\", \"matchCriteriaId\": \"03C15EB0-1D29-4DBE-B2C0-FE9365E8D624\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:quicktime:5.0.1:-:windows:*:*:*:*:*\", \"matchCriteriaId\": \"EE3EAE38-9DE6-450D-BCD0-70E590C1F76E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:quicktime:5.0.2:-:windows:*:*:*:*:*\", \"matchCriteriaId\": \"63D7214C-FAF6-4DCA-8520-8A539BDCD98A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:quicktime:6.0:-:windows:*:*:*:*:*\", \"matchCriteriaId\": \"0D02D35D-E957-4949-B5DA-F3654B13A308\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:quicktime:6.0.0:-:windows:*:*:*:*:*\", \"matchCriteriaId\": \"FC48F2B6-4BC7-4B57-ADE2-4907287A1AA0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:quicktime:6.0.1:-:windows:*:*:*:*:*\", \"matchCriteriaId\": \"6469AEDC-6F9D-4CAC-84B2-F13107626FB4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:quicktime:6.0.2:-:windows:*:*:*:*:*\", \"matchCriteriaId\": \"CB2DFC1B-6452-4575-A099-2E5FD387A8AB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:quicktime:6.1.0:-:windows:*:*:*:*:*\", \"matchCriteriaId\": \"01A24DD9-5AB8-4091-A293-1A2D7953D455\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:quicktime:6.1.1:-:windows:*:*:*:*:*\", \"matchCriteriaId\": \"D282FA67-0089-4ED5-8168-E3CE8B510BBA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:quicktime:6.2.0:-:windows:*:*:*:*:*\", \"matchCriteriaId\": \"2B5928A2-C989-4B27-91E1-7019277B2E1F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:quicktime:6.3.0:-:windows:*:*:*:*:*\", \"matchCriteriaId\": \"51292C8C-4905-4C30-B166-ACCE39D9DEE5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:quicktime:6.4.0:-:windows:*:*:*:*:*\", \"matchCriteriaId\": \"3433487A-98ED-4C28-8659-609BF395E23A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:quicktime:6.5.0:-:windows:*:*:*:*:*\", \"matchCriteriaId\": \"335F4D89-983A-4C05-937A-EEE802A260D9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:quicktime:6.5.1:-:windows:*:*:*:*:*\", \"matchCriteriaId\": \"7F189FAB-3BA1-4C1B-975F-E174D5CB8771\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:quicktime:6.5.2:-:windows:*:*:*:*:*\", \"matchCriteriaId\": \"F7A30674-38BA-49B8-9DE0-4C9FB5A62DA8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:quicktime:7.0:-:windows:*:*:*:*:*\", \"matchCriteriaId\": \"284BAF97-86BC-4520-BAB6-D75D18FFA1DC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:quicktime:7.0.0:-:windows:*:*:*:*:*\", \"matchCriteriaId\": \"3F4075B0-0F9F-466B-8521-2156849247C2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:quicktime:7.0.1:-:windows:*:*:*:*:*\", \"matchCriteriaId\": \"DF2A6BCB-108E-4226-BC31-6E0057DFB6D2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:quicktime:7.0.2:-:windows:*:*:*:*:*\", \"matchCriteriaId\": \"F8BF6A6A-F734-4395-9305-2E9F52EE888F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:quicktime:7.0.3:-:windows:*:*:*:*:*\", \"matchCriteriaId\": \"AFCB45F3-397E-42A8-8D08-ECF667939FF8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:quicktime:7.0.4:-:windows:*:*:*:*:*\", \"matchCriteriaId\": \"D5C04F70-E2E6-48F4-948D-9D0C7B2A2F3D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:quicktime:7.1.0:-:windows:*:*:*:*:*\", \"matchCriteriaId\": \"E1DB3FBD-40F4-41FB-A939-3E3A4D0D85B2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:quicktime:7.1.1:-:windows:*:*:*:*:*\", \"matchCriteriaId\": \"F45B47BB-E14F-4437-8828-EF059496BF95\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:quicktime:7.1.2:-:windows:*:*:*:*:*\", \"matchCriteriaId\": \"9B353211-F90E-4F38-9D0B-B8C7EC00E66F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:quicktime:7.1.3:-:windows:*:*:*:*:*\", \"matchCriteriaId\": \"F6A44CA9-D257-4BB7-B5AB-23193F35FCB5\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2CF61F35-5905-4BA9-AD7E-7DB261D2F256\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:quicktime:*:-:mac:*:*:*:*:*\", \"versionEndIncluding\": \"7.1.4\", \"matchCriteriaId\": \"230D8FA7-0AC5-49E5-B886-8ECCD2554700\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:quicktime:3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D8F310A8-F760-4059-987D-42369F360DE4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:quicktime:4.1.2:-:mac:*:*:*:*:*\", \"matchCriteriaId\": \"ACE0F153-80B3-4469-AE49-4B7517218574\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:quicktime:5.0.1:-:mac:*:*:*:*:*\", \"matchCriteriaId\": \"53527707-E903-4A12-AB87-6EC5FA9F2EC6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:quicktime:5.0.2:-:mac:*:*:*:*:*\", \"matchCriteriaId\": \"A91242F5-485E-4125-A19C-4C20B602DD5D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:quicktime:6.0.0:-:mac:*:*:*:*:*\", \"matchCriteriaId\": \"8399665C-F8A8-4133-A0CD-E767F8266E94\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:quicktime:6.0.1:-:mac:*:*:*:*:*\", \"matchCriteriaId\": \"F7B48C74-28CC-4348-9CF9-9AF58C7A5E72\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:quicktime:6.0.2:-:mac:*:*:*:*:*\", \"matchCriteriaId\": \"904FA4B7-A6CB-48B4-B887-4B349479D1A5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:quicktime:6.1.0:-:mac:*:*:*:*:*\", \"matchCriteriaId\": \"B2FC05FE-5A85-4D78-BAAF-FFCC2CC4CAFC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:quicktime:6.1.1:-:mac:*:*:*:*:*\", \"matchCriteriaId\": \"BB113931-F886-425C-A0F8-171F6D71A02F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:quicktime:6.2.0:-:mac:*:*:*:*:*\", \"matchCriteriaId\": \"0A2B95BD-A728-4EE7-A4C9-E1547C34E8E9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:quicktime:6.3.0:-:mac:*:*:*:*:*\", \"matchCriteriaId\": \"05AA3258-E556-4443-AF79-96882A9CF33C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:quicktime:6.4.0:-:mac:*:*:*:*:*\", \"matchCriteriaId\": \"546B9E74-E86B-462B-A58E-017E3B780B63\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:quicktime:6.5.0:-:mac:*:*:*:*:*\", \"matchCriteriaId\": \"579E49C1-2F66-4CCB-AAE4-6C15089C2D1E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:quicktime:6.5.1:-:mac:*:*:*:*:*\", \"matchCriteriaId\": \"49477EAA-5AA2-4B55-8BEF-AB3E118DE618\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:quicktime:6.5.2:-:mac:*:*:*:*:*\", \"matchCriteriaId\": \"19AAC0DE-53D7-42E4-90D2-939C5DF6F651\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:quicktime:7.0.0:-:mac:*:*:*:*:*\", \"matchCriteriaId\": \"04F44BB3-5221-4D8A-ABC3-C51EC76A5B2E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:quicktime:7.0.1:-:mac:*:*:*:*:*\", \"matchCriteriaId\": \"E1B24679-4C63-4320-A79F-E19CCFA537D6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:quicktime:7.0.2:-:mac:*:*:*:*:*\", \"matchCriteriaId\": \"D0D28529-2A0A-4398-98C2-C35BABB9373A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:quicktime:7.0.3:-:mac:*:*:*:*:*\", \"matchCriteriaId\": \"402BBD8E-4960-43C0-8D46-6F20BBA6BF2A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:quicktime:7.0.4:-:mac:*:*:*:*:*\", \"matchCriteriaId\": \"BDBD1E93-C675-4248-ACE6-C49DBE7B3E7B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:quicktime:7.1.0:-:mac:*:*:*:*:*\", \"matchCriteriaId\": \"EA16CB14-D053-4CDB-B80A-8AC9D17FACAC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:quicktime:7.1.1:-:mac:*:*:*:*:*\", \"matchCriteriaId\": \"60500521-46FC-4734-901C-0A5E5D3DB9EF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:quicktime:7.1.2:-:mac:*:*:*:*:*\", \"matchCriteriaId\": \"682C7A59-6F3C-4E50-A145-D081614CD42F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:quicktime:7.1.3:-:mac:*:*:*:*:*\", \"matchCriteriaId\": \"D69BB04E-E696-4B34-95DE-B42F46697F9F\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DC6931D5-DE7E-41F6-ADDC-AB5A8A167F69\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0760FDDB-38D3-4263-9B4D-1AF5E613A4F9\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.4.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6B8B16DB-4D1F-41B7-A7A2-2A443596E1AE\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AFD4DE58-46C7-4E69-BF36-C5FD768B8248\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CF824694-52DE-44E3-ACAD-60B2A84CD3CE\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B73A0891-A37A-4E0D-AA73-B18BFD6B1447\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.4.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"26AC38AB-D689-4B2B-9DAE-F03F4DFD15BE\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0C580935-0091-4163-B747-750FB7686973\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.4.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BB0F2132-8431-4CEF-9A3D-A69425E3834E\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.4.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8719F3C4-F1DE-49B5-9301-22414A2B6F9C\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"09ED46A8-1739-411C-8807-2A416BDB6DFE\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.4.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"786BB737-EA99-4EC6-B742-0C35BF2453F9\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.4.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8D089858-3AF9-4B82-912D-AA33F25E3715\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6EE39585-CF3B-4493-96D8-B394544C7643\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D2442D35-7484-43D8-9077-3FDF63104816\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.5.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DC90AA12-DD17-4607-90CB-E342E83F20BB\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3F3E721C-00CA-4D51-B542-F2BC5C0D65BF\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B3267A41-1AE0-48B8-BD1F-DEC8A212851A\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.5.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"855288F1-0242-4951-AB3F-B7AF13E21CF6\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.5.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"10082781-B93E-4B84-94F2-FA9749B4D92B\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.5.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AE1EBF04-C440-4A6B-93F2-DC3A812728C2\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.5.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DFB077A2-927B-43AF-BFD5-0E78648C9394\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Heap-based buffer overflow in Apple QuickTime before 7.1.5 allows remote user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted MIDI file.\"}, {\"lang\": \"es\", \"value\": \"Desbordamiento de b\\u00fafer basado en mont\\u00f3n en Apple QuickTime anterior a 7.1.5 permite a atacantes remotos con la intervenci\\u00f3n del usuario provocar una denegaci\\u00f3n de servicio (ca\\u00edda) y posiblemente ejecutar c\\u00f3digo de su elecci\\u00f3n mediante un archivo MIDI manipulado.\"}]",
"id": "CVE-2007-0712",
"lastModified": "2024-11-21T00:26:33.420",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:C/I:C/A:C\", \"baseScore\": 9.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 8.6, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
"published": "2007-03-05T22:19:00.000",
"references": "[{\"url\": \"http://docs.info.apple.com/article.html?artnum=305149\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://lists.apple.com/archives/Security-announce/2007/Mar/msg00000.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://osvdb.org/33904\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/24359\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.kb.cert.org/vuls/id/822481\", \"source\": \"cve@mitre.org\", \"tags\": [\"US Government Resource\"]}, {\"url\": \"http://www.securityfocus.com/bid/22827\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securitytracker.com/id?1017725\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.us-cert.gov/cas/techalerts/TA07-065A.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"US Government Resource\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2007/0825\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/32816\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://docs.info.apple.com/article.html?artnum=305149\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.apple.com/archives/Security-announce/2007/Mar/msg00000.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://osvdb.org/33904\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/24359\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.kb.cert.org/vuls/id/822481\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"US Government Resource\"]}, {\"url\": \"http://www.securityfocus.com/bid/22827\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securitytracker.com/id?1017725\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.us-cert.gov/cas/techalerts/TA07-065A.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"US Government Resource\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2007/0825\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/32816\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-119\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2007-0712\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2007-03-05T22:19:00.000\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Heap-based buffer overflow in Apple QuickTime before 7.1.5 allows remote user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted MIDI file.\"},{\"lang\":\"es\",\"value\":\"Desbordamiento de b\u00fafer basado en mont\u00f3n en Apple QuickTime anterior a 7.1.5 permite a atacantes remotos con la intervenci\u00f3n del usuario provocar una denegaci\u00f3n de servicio (ca\u00edda) y posiblemente ejecutar c\u00f3digo de su elecci\u00f3n mediante un archivo MIDI manipulado.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:C/I:C/A:C\",\"baseScore\":9.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.6,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:*:-:windows:*:*:*:*:*\",\"versionEndIncluding\":\"7.1.4\",\"matchCriteriaId\":\"D4848C0C-7CEA-4C7A-956E-0C460A5E3896\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8F310A8-F760-4059-987D-42369F360DE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:4.1.2:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"03C15EB0-1D29-4DBE-B2C0-FE9365E8D624\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:5.0.1:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"EE3EAE38-9DE6-450D-BCD0-70E590C1F76E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:5.0.2:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"63D7214C-FAF6-4DCA-8520-8A539BDCD98A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.0:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"0D02D35D-E957-4949-B5DA-F3654B13A308\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.0.0:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"FC48F2B6-4BC7-4B57-ADE2-4907287A1AA0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.0.1:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"6469AEDC-6F9D-4CAC-84B2-F13107626FB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.0.2:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"CB2DFC1B-6452-4575-A099-2E5FD387A8AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.1.0:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"01A24DD9-5AB8-4091-A293-1A2D7953D455\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.1.1:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"D282FA67-0089-4ED5-8168-E3CE8B510BBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.2.0:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"2B5928A2-C989-4B27-91E1-7019277B2E1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.3.0:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"51292C8C-4905-4C30-B166-ACCE39D9DEE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.4.0:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"3433487A-98ED-4C28-8659-609BF395E23A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.5.0:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"335F4D89-983A-4C05-937A-EEE802A260D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.5.1:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"7F189FAB-3BA1-4C1B-975F-E174D5CB8771\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.5.2:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"F7A30674-38BA-49B8-9DE0-4C9FB5A62DA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.0:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"284BAF97-86BC-4520-BAB6-D75D18FFA1DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.0.0:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"3F4075B0-0F9F-466B-8521-2156849247C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.0.1:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"DF2A6BCB-108E-4226-BC31-6E0057DFB6D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.0.2:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"F8BF6A6A-F734-4395-9305-2E9F52EE888F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.0.3:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"AFCB45F3-397E-42A8-8D08-ECF667939FF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.0.4:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"D5C04F70-E2E6-48F4-948D-9D0C7B2A2F3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.1.0:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"E1DB3FBD-40F4-41FB-A939-3E3A4D0D85B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.1.1:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"F45B47BB-E14F-4437-8828-EF059496BF95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.1.2:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"9B353211-F90E-4F38-9D0B-B8C7EC00E66F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.1.3:-:windows:*:*:*:*:*\",\"matchCriteriaId\":\"F6A44CA9-D257-4BB7-B5AB-23193F35FCB5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CF61F35-5905-4BA9-AD7E-7DB261D2F256\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:*:-:mac:*:*:*:*:*\",\"versionEndIncluding\":\"7.1.4\",\"matchCriteriaId\":\"230D8FA7-0AC5-49E5-B886-8ECCD2554700\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8F310A8-F760-4059-987D-42369F360DE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:4.1.2:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"ACE0F153-80B3-4469-AE49-4B7517218574\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:5.0.1:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"53527707-E903-4A12-AB87-6EC5FA9F2EC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:5.0.2:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"A91242F5-485E-4125-A19C-4C20B602DD5D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.0.0:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"8399665C-F8A8-4133-A0CD-E767F8266E94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.0.1:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"F7B48C74-28CC-4348-9CF9-9AF58C7A5E72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.0.2:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"904FA4B7-A6CB-48B4-B887-4B349479D1A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.1.0:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"B2FC05FE-5A85-4D78-BAAF-FFCC2CC4CAFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.1.1:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"BB113931-F886-425C-A0F8-171F6D71A02F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.2.0:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"0A2B95BD-A728-4EE7-A4C9-E1547C34E8E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.3.0:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"05AA3258-E556-4443-AF79-96882A9CF33C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.4.0:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"546B9E74-E86B-462B-A58E-017E3B780B63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.5.0:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"579E49C1-2F66-4CCB-AAE4-6C15089C2D1E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.5.1:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"49477EAA-5AA2-4B55-8BEF-AB3E118DE618\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:6.5.2:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"19AAC0DE-53D7-42E4-90D2-939C5DF6F651\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.0.0:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"04F44BB3-5221-4D8A-ABC3-C51EC76A5B2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.0.1:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"E1B24679-4C63-4320-A79F-E19CCFA537D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.0.2:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"D0D28529-2A0A-4398-98C2-C35BABB9373A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.0.3:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"402BBD8E-4960-43C0-8D46-6F20BBA6BF2A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.0.4:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"BDBD1E93-C675-4248-ACE6-C49DBE7B3E7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.1.0:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"EA16CB14-D053-4CDB-B80A-8AC9D17FACAC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.1.1:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"60500521-46FC-4734-901C-0A5E5D3DB9EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.1.2:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"682C7A59-6F3C-4E50-A145-D081614CD42F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.1.3:-:mac:*:*:*:*:*\",\"matchCriteriaId\":\"D69BB04E-E696-4B34-95DE-B42F46697F9F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC6931D5-DE7E-41F6-ADDC-AB5A8A167F69\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0760FDDB-38D3-4263-9B4D-1AF5E613A4F9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B8B16DB-4D1F-41B7-A7A2-2A443596E1AE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFD4DE58-46C7-4E69-BF36-C5FD768B8248\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF824694-52DE-44E3-ACAD-60B2A84CD3CE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B73A0891-A37A-4E0D-AA73-B18BFD6B1447\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26AC38AB-D689-4B2B-9DAE-F03F4DFD15BE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C580935-0091-4163-B747-750FB7686973\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.4.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB0F2132-8431-4CEF-9A3D-A69425E3834E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.4.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8719F3C4-F1DE-49B5-9301-22414A2B6F9C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09ED46A8-1739-411C-8807-2A416BDB6DFE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.4.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"786BB737-EA99-4EC6-B742-0C35BF2453F9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.4.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D089858-3AF9-4B82-912D-AA33F25E3715\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EE39585-CF3B-4493-96D8-B394544C7643\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2442D35-7484-43D8-9077-3FDF63104816\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC90AA12-DD17-4607-90CB-E342E83F20BB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F3E721C-00CA-4D51-B542-F2BC5C0D65BF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3267A41-1AE0-48B8-BD1F-DEC8A212851A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"855288F1-0242-4951-AB3F-B7AF13E21CF6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10082781-B93E-4B84-94F2-FA9749B4D92B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE1EBF04-C440-4A6B-93F2-DC3A812728C2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFB077A2-927B-43AF-BFD5-0E78648C9394\"}]}]}],\"references\":[{\"url\":\"http://docs.info.apple.com/article.html?artnum=305149\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.apple.com/archives/Security-announce/2007/Mar/msg00000.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://osvdb.org/33904\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/24359\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.kb.cert.org/vuls/id/822481\",\"source\":\"cve@mitre.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.securityfocus.com/bid/22827\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securitytracker.com/id?1017725\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA07-065A.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.vupen.com/english/advisories/2007/0825\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/32816\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://docs.info.apple.com/article.html?artnum=305149\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.apple.com/archives/Security-announce/2007/Mar/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://osvdb.org/33904\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/24359\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.kb.cert.org/vuls/id/822481\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.securityfocus.com/bid/22827\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id?1017725\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA07-065A.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.vupen.com/english/advisories/2007/0825\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/32816\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…