cve-2007-2388
Vulnerability from cvelistv5
Published
2007-05-29 21:00
Modified
2024-08-07 13:33
Severity ?
Summary
Apple QuickTime for Java 7.1.6 on Mac OS X and Windows does not properly restrict QTObject subclassing, which allows remote attackers to execute arbitrary code via a web page containing a user-defined class that accesses unsafe functions that can be leveraged to write to arbitrary memory locations.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T13:33:28.638Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "APPLE-SA-2007-05-29",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2007/May/msg00005.html"
          },
          {
            "name": "ADV-2007-1974",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/1974"
          },
          {
            "name": "1018136",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1018136"
          },
          {
            "name": "VU#995836",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/995836"
          },
          {
            "name": "35576",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/35576"
          },
          {
            "name": "25130",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25130"
          },
          {
            "name": "24221",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/24221"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secunia.com/secunia_research/2007-52/advisory/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-05-29T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Apple QuickTime for Java 7.1.6 on Mac OS X and Windows does not properly restrict QTObject subclassing, which allows remote attackers to execute arbitrary code via a web page containing a user-defined class that accesses unsafe functions that can be leveraged to write to arbitrary memory locations."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2007-06-09T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "APPLE-SA-2007-05-29",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2007/May/msg00005.html"
        },
        {
          "name": "ADV-2007-1974",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/1974"
        },
        {
          "name": "1018136",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1018136"
        },
        {
          "name": "VU#995836",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/995836"
        },
        {
          "name": "35576",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/35576"
        },
        {
          "name": "25130",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25130"
        },
        {
          "name": "24221",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/24221"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secunia.com/secunia_research/2007-52/advisory/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-2388",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Apple QuickTime for Java 7.1.6 on Mac OS X and Windows does not properly restrict QTObject subclassing, which allows remote attackers to execute arbitrary code via a web page containing a user-defined class that accesses unsafe functions that can be leveraged to write to arbitrary memory locations."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "APPLE-SA-2007-05-29",
              "refsource": "APPLE",
              "url": "http://lists.apple.com/archives/security-announce/2007/May/msg00005.html"
            },
            {
              "name": "ADV-2007-1974",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/1974"
            },
            {
              "name": "1018136",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1018136"
            },
            {
              "name": "VU#995836",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/995836"
            },
            {
              "name": "35576",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/35576"
            },
            {
              "name": "25130",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25130"
            },
            {
              "name": "24221",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/24221"
            },
            {
              "name": "http://secunia.com/secunia_research/2007-52/advisory/",
              "refsource": "MISC",
              "url": "http://secunia.com/secunia_research/2007-52/advisory/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-2388",
    "datePublished": "2007-05-29T21:00:00",
    "dateReserved": "2007-04-30T00:00:00",
    "dateUpdated": "2024-08-07T13:33:28.638Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0FF5999A-9D12-4CDD-8DE9-A89C10B2D574\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"99C273D1-ADFE-4B4C-B543-7B9CA741A117\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0BC31B69-3DE1-4CF3-ADC9-CA0BF1714CBF\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"77CC671C-6D89-4279-86F7-DDE1D4D9A0CA\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8E4B77F6-E71C-45ED-96CC-7872AD2FCBF8\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"066ABC3B-B395-42D2-95C0-5B810F91A6F0\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"01BC19FC-6E03-4000-AE4B-232E47FA76F2\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"421FC2DD-0CF7-44A2-A63C-5221689E2363\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0F8B70BC-42B7-453A-B506-7BE69D49A4B5\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FAAC6EA5-DCB2-4A50-A8BC-25CC43FAEF9B\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.1.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CA32F7D8-02F8-4CFE-B193-2888807BC4D6\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.1.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A9DCDE70-07DA-4F0B-805F-6BA03D410CD6\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CDCF4FB3-F781-46D5-BEE7-485B3DC78B83\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AE52A344-8B07-480D-A57F-B1F6E6574F3B\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.2.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"56CC0444-570C-4BB5-B53A-C5CA0BD87935\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.2.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"62E3EED7-FE30-4620-B40B-9CC49B77408A\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.2.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5AFD8BC6-4893-4D9D-A26E-27AAC864F94B\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.2.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9BD1F9A1-5ADB-451D-9525-D545E42D2B8F\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.2.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D7A24978-2891-425C-ACF6-E8F5C839C54A\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.2.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9B20E130-6078-4336-B614-273C27142B46\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.2.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AB461678-560D-436E-A3AE-9E1E16DB0412\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BFDADE04-29F0-446B-824B-0518880CF0A0\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ED9BE602-A740-4CF7-9CAF-59061B16AB31\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"33E698C1-C313-40E6-BAF9-7C8F9CF02484\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.3.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BF2D00AC-FA2A-4C39-B796-DC19072862CF\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.3.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"421079DA-B605-4E05-9454-C30CF7631CF4\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.3.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"93B734BA-3435-40A9-B22B-5D56CEB865A7\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.3.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C4B57B3E-B1B2-4F13-99D3-4F9DB3C07B5E\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.3.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"30897327-44DD-4D6C-B8B6-2D66C44EA55D\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.3.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B79D8F73-2E78-4A67-96BB-21AD9BCB0094\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DC6931D5-DE7E-41F6-ADDC-AB5A8A167F69\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0760FDDB-38D3-4263-9B4D-1AF5E613A4F9\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AFD4DE58-46C7-4E69-BF36-C5FD768B8248\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CF824694-52DE-44E3-ACAD-60B2A84CD3CE\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B73A0891-A37A-4E0D-AA73-B18BFD6B1447\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.4.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"26AC38AB-D689-4B2B-9DAE-F03F4DFD15BE\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0C580935-0091-4163-B747-750FB7686973\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.4.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BB0F2132-8431-4CEF-9A3D-A69425E3834E\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.4.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8719F3C4-F1DE-49B5-9301-22414A2B6F9C\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"09ED46A8-1739-411C-8807-2A416BDB6DFE\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.4.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"786BB737-EA99-4EC6-B742-0C35BF2453F9\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:microsoft:all_windows:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3AB4B29F-4C60-48A0-8F58-BCBDC58B697E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:quicktime:7.1.6:*:java:*:*:*:*:*\", \"matchCriteriaId\": \"CF6369C7-DA45-4E7D-A258-FDCA0EEDD842\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Apple QuickTime for Java 7.1.6 on Mac OS X and Windows does not properly restrict QTObject subclassing, which allows remote attackers to execute arbitrary code via a web page containing a user-defined class that accesses unsafe functions that can be leveraged to write to arbitrary memory locations.\"}, {\"lang\": \"es\", \"value\": \"Apple QuickTime para Java versi\\u00f3n 7.1.6 en Mac OS X y Windows, no restringe apropiadamente la subclase de QTObject, lo que permite a atacantes remotos ejecutar c\\u00f3digo arbitrario por medio de una p\\u00e1gina web que contiene una clase definida por el usuario que accede a funciones no seguras que pueden ser aprovechadas para escribir en ubicaciones de memoria arbitrarias.\"}]",
      "id": "CVE-2007-2388",
      "lastModified": "2024-11-21T00:30:39.827",
      "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:C/I:C/A:C\", \"baseScore\": 9.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 8.6, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": true, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
      "published": "2007-05-29T21:30:00.000",
      "references": "[{\"url\": \"http://lists.apple.com/archives/security-announce/2007/May/msg00005.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/25130\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/secunia_research/2007-52/advisory/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.kb.cert.org/vuls/id/995836\", \"source\": \"cve@mitre.org\", \"tags\": [\"US Government Resource\"]}, {\"url\": \"http://www.osvdb.org/35576\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/bid/24221\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securitytracker.com/id?1018136\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.vupen.com/english/advisories/2007/1974\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://lists.apple.com/archives/security-announce/2007/May/msg00005.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/25130\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/secunia_research/2007-52/advisory/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.kb.cert.org/vuls/id/995836\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"US Government Resource\"]}, {\"url\": \"http://www.osvdb.org/35576\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/24221\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securitytracker.com/id?1018136\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2007/1974\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
      "sourceIdentifier": "cve@mitre.org",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-264\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2007-2388\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2007-05-29T21:30:00.000\",\"lastModified\":\"2024-11-21T00:30:39.827\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Apple QuickTime for Java 7.1.6 on Mac OS X and Windows does not properly restrict QTObject subclassing, which allows remote attackers to execute arbitrary code via a web page containing a user-defined class that accesses unsafe functions that can be leveraged to write to arbitrary memory locations.\"},{\"lang\":\"es\",\"value\":\"Apple QuickTime para Java versi\u00f3n 7.1.6 en Mac OS X y Windows, no restringe apropiadamente la subclase de QTObject, lo que permite a atacantes remotos ejecutar c\u00f3digo arbitrario por medio de una p\u00e1gina web que contiene una clase definida por el usuario que accede a funciones no seguras que pueden ser aprovechadas para escribir en ubicaciones de memoria arbitrarias.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:C/I:C/A:C\",\"baseScore\":9.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.6,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":true,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-264\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FF5999A-9D12-4CDD-8DE9-A89C10B2D574\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99C273D1-ADFE-4B4C-B543-7B9CA741A117\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0BC31B69-3DE1-4CF3-ADC9-CA0BF1714CBF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77CC671C-6D89-4279-86F7-DDE1D4D9A0CA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E4B77F6-E71C-45ED-96CC-7872AD2FCBF8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"066ABC3B-B395-42D2-95C0-5B810F91A6F0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01BC19FC-6E03-4000-AE4B-232E47FA76F2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"421FC2DD-0CF7-44A2-A63C-5221689E2363\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F8B70BC-42B7-453A-B506-7BE69D49A4B5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAAC6EA5-DCB2-4A50-A8BC-25CC43FAEF9B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA32F7D8-02F8-4CFE-B193-2888807BC4D6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9DCDE70-07DA-4F0B-805F-6BA03D410CD6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDCF4FB3-F781-46D5-BEE7-485B3DC78B83\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE52A344-8B07-480D-A57F-B1F6E6574F3B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56CC0444-570C-4BB5-B53A-C5CA0BD87935\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62E3EED7-FE30-4620-B40B-9CC49B77408A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AFD8BC6-4893-4D9D-A26E-27AAC864F94B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BD1F9A1-5ADB-451D-9525-D545E42D2B8F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7A24978-2891-425C-ACF6-E8F5C839C54A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B20E130-6078-4336-B614-273C27142B46\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB461678-560D-436E-A3AE-9E1E16DB0412\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFDADE04-29F0-446B-824B-0518880CF0A0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED9BE602-A740-4CF7-9CAF-59061B16AB31\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33E698C1-C313-40E6-BAF9-7C8F9CF02484\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF2D00AC-FA2A-4C39-B796-DC19072862CF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"421079DA-B605-4E05-9454-C30CF7631CF4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93B734BA-3435-40A9-B22B-5D56CEB865A7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4B57B3E-B1B2-4F13-99D3-4F9DB3C07B5E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.3.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30897327-44DD-4D6C-B8B6-2D66C44EA55D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.3.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B79D8F73-2E78-4A67-96BB-21AD9BCB0094\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC6931D5-DE7E-41F6-ADDC-AB5A8A167F69\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0760FDDB-38D3-4263-9B4D-1AF5E613A4F9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFD4DE58-46C7-4E69-BF36-C5FD768B8248\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF824694-52DE-44E3-ACAD-60B2A84CD3CE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B73A0891-A37A-4E0D-AA73-B18BFD6B1447\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26AC38AB-D689-4B2B-9DAE-F03F4DFD15BE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C580935-0091-4163-B747-750FB7686973\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.4.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB0F2132-8431-4CEF-9A3D-A69425E3834E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.4.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8719F3C4-F1DE-49B5-9301-22414A2B6F9C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09ED46A8-1739-411C-8807-2A416BDB6DFE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.4.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"786BB737-EA99-4EC6-B742-0C35BF2453F9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:all_windows:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3AB4B29F-4C60-48A0-8F58-BCBDC58B697E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:quicktime:7.1.6:*:java:*:*:*:*:*\",\"matchCriteriaId\":\"CF6369C7-DA45-4E7D-A258-FDCA0EEDD842\"}]}]}],\"references\":[{\"url\":\"http://lists.apple.com/archives/security-announce/2007/May/msg00005.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/25130\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/secunia_research/2007-52/advisory/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/995836\",\"source\":\"cve@mitre.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.osvdb.org/35576\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/24221\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securitytracker.com/id?1018136\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/1974\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2007/May/msg00005.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/25130\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/secunia_research/2007-52/advisory/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/995836\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.osvdb.org/35576\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/24221\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id?1018136\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/1974\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.